Checkmate
  • Checkmate Home
  • NII Home
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Company

Penetration Testing

Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer

May 21, 2018 Chetan Nayak 17

The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop of the client or to [more]

Reverse Engineering For Beginners – XOR encryption – Windows x64

May 10, 2018 Chetan Nayak 0

Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This was good to start for [more]

Malware development – Welcome to the Dark Side: Part 4

March 25, 2018 Chetan Nayak 1

Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to the commands from our botnet [more]

Malware development – Welcome to the Dark Side: Part 3

March 10, 2018 Chetan Nayak 2

In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat listener. However, netcat is not [more]

Malware development – Welcome to the Dark Side: Part 2-2

March 6, 2018 Chetan Nayak 5

  In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using Windows API. In this blog, [more]

Malware Development – Welcome to the Dark Side: Part 2-1

February 19, 2018 Chetan Nayak 0

Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length of Part 2, I have split this 2nd part of [more]

Malware Development – Welcome to the Dark Side: Part 1

February 14, 2018 Chetan Nayak 1

If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks tend to use Metasploit combined with Veil-Evasion or PE injectors [more]

Posts navigation

1 2 »

Search

"What investments make the most sense when it comes to application security?"


Register for our Application Security – State of the Nation report and fill in the survey!

Recent Posts

  • The California Consumer Privacy Act
  • Token Manipulation Attacks – Part 2 (Process of Impersonation)
  • Token Manipulation Attacks (Part 1: Introduction to Tokens and Privileges)
  • RPA (Robotic Process Automation) Use Cases (Part 3)
  • Securing and Auditing RPA (Remote Process Automation) Environment (Part 2)

Recent Comments

  • Jai Kumar Sharma on A Detailed Guide on OSCP Preparation – From Newbie to OSCP
  • Pradnesh Chavan on A Detailed Guide on OSCP Preparation – From Newbie to OSCP
  • Michael on Malware Development – Welcome to the Dark Side: Part 1
  • krishna yadav on Breach Response – Lessons learnt in the past one year
  • chan doi di bui on A Detailed Guide on OSCP Preparation – From Newbie to OSCP

Search

Copyright © 2019 | WordPress Theme by MH Themes