Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

virus

Malware development – Welcome to the Dark Side: Part 4

March 25, 2018 Chetan Nayak 2

Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a binary which can listen to the commands from our botnet [more]

Malware development – Welcome to the Dark Side: Part 3

March 10, 2018 Chetan Nayak 3

In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat listener. However, netcat is not [more]

Malware development – Welcome to the Dark Side: Part 2-2

March 6, 2018 Chetan Nayak 5

  In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using Windows API. In this blog, [more]

Malware Development – Welcome to the Dark Side: Part 2-1

February 19, 2018 Chetan Nayak 3

Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length of Part 2, I have split this 2nd part of [more]

Malware Development – Welcome to the Dark Side: Part 1

February 14, 2018 Chetan Nayak 5

If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks tend to use Metasploit combined with Veil-Evasion or PE injectors [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 103 other subscribers

Top Posts

  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • Malware Development – Welcome to the Dark Side: Part 2-1
    Malware Development – Welcome to the Dark Side: Part 2-1
  • New Wave of Targeted Hacking Campaigns and Ransomware Attacks Exploiting Microsoft Exchange Server Vulnerabilities
    New Wave of Targeted Hacking Campaigns and Ransomware Attacks Exploiting Microsoft Exchange Server Vulnerabilities
  • Bypassing Detection for a Reverse Meterpreter Shell
    Bypassing Detection for a Reverse Meterpreter Shell
  • Reverse Engineering x64 for Beginners - Windows
    Reverse Engineering x64 for Beginners - Windows
  • Technical Analysis of DearCry Ransomware
    Technical Analysis of DearCry Ransomware
  • Hunting Passwords In SYSVOL
    Hunting Passwords In SYSVOL
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • Stalkerware – Is Somebody Watching You?
  • Technical Analysis of DearCry Ransomware
  • DearCry Makes Organisations Cry
  • New Wave of Targeted Hacking Campaigns and Ransomware Attacks Exploiting Microsoft Exchange Server Vulnerabilities
  • Vulnerabilities and Privacy Issues with Clubhouse App
  • What is the security feature bypass vulnerability & update affecting Windows customers worldwide?
  • How to Evaluate the ROI on Your Cyber Security Investments?
  • SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors
  • SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
  • SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
Assessment C++ coding Cyber Security Elasticsearch ELK forensics FUD fully undetectable hacking keylogger Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting red team remote access reverse shell security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2021 | WordPress Theme by MH Themes