Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Articles by Chetan Nayak

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion

December 10, 2018 Chetan Nayak 2

Hey, It’s been a busy month for me and I was not able to save time to write the final part of the series on Malware Development. But I am [more]

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

November 13, 2018 Chetan Nayak 0

Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things would be pretty different. In this post, we will be [more]

Malware on Steroids 1

Malware on Steroids – Part 1: Simple CMD Reverse Shell

November 5, 2018 Chetan Nayak 0

The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the videos yet, here are my links to both the antivirus [more]

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

May 21, 2018 Chetan Nayak 17

The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop of the client or to [more]

Reverse Engineering For Beginners – XOR encryption – Windows x64

May 10, 2018 Chetan Nayak 0

Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This was good to start for [more]

Reverse Engineering x64 for Beginners – Windows

April 23, 2018 Chetan Nayak 1

Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In this blog however, we will [more]

Reverse Engineering x64 for Beginners – Linux

April 23, 2018 Chetan Nayak 3

Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since this is the age of [more]

Posts navigation

1 2 3 »

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 122 other subscribers

Top Posts

  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Zero-day vulnerability (aka Log4Shell) in Apache Log4j is being actively exploited
    Zero-day vulnerability (aka Log4Shell) in Apache Log4j is being actively exploited
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
    Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
    Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
    Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Revealing REvil
    Revealing REvil
  • Significance of a career in Security Operations Center  (SOC)
    Significance of a career in Security Operations Center (SOC)
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
  • Make it to Santa’s ‘Nice’ Cybersecurity list!
  • 7 Steps To Protect Your Digital Privacy In This Holiday Season!
Assessment C++ coding cybersecurity Cyber Security Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes