Anonymizing VM Traffic (Introduction)
WARNING: The information included in this tutorial could be used for malicious purposes in the wrong hands, please expect to be yelled at by people who think you are a bad guy if you start talking...
View ArticleAnonymizing Traffic for your Host System
Security Level: Light Purpose: To hide who you are while performing research through your browser. Benefits:Hide your IPEasy to set upCan be run off of a USB stickDrawbacks:Drive-by attacks can still...
View ArticleAnonymizing Traffic For Your VM
Security Level: MediumPurpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks.Benefits:Hide your IPProtect the host...
View ArticleAnonymizing Traffic for your VM And Capturing Traffic
Security Level: High / HardcorePurpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform...
View ArticleOh, the Sites You Will Never See
Staying safe online requires more than just avoiding web-sites that look untrustworthy. These days, you might be redirected and/or infected with malware by the advertisement banner showing on a...
View ArticleDEFCON 21: An Odyssey
If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21 then you might be interested in how it went. Well, rather than doing what I did last year and...
View ArticleMemory scan
Memory Scan You may have noticed this line in a Malwarebytes Anti-Malware log “Memory : Enabled” or looked at the setting shown below. To explain why you would want Malwarebytes Anti-Malware, or your...
View ArticleOpen Source Laptop
A couple of months ago, I watched the live stream of the Chaos Computer Club with one of the talks called “The Exploration and Exploitation of an SD Memory Card”. It was given by Sean “xobs” Cross and...
View ArticleUEFI, SecureBoot, and dual booting Windows 8 and Linux
In this post I will explain UEFI (Unified Extensible Firmware Interface) and its predecessor, the BIOS/MBR, as well as the challenges to get a dual boot environment with an alternative operating...
View ArticleGoodbye CD Wallet. Hello ISOSTICK!
The ISOSTICK is a USB stick that masquerades as an external CD/DVD drive and loads ISOs from a removable MicroSD card. Many of our readers are the tech support, help desk and IT department for their...
View ArticleIntroduction to Alternate Data Streams
What are Alternate Data Streams? Alternate Data Streams (ADS) are a file attribute only found on the NTFS file system. In this system a file is built up from a couple of attributes, one of them is...
View ArticleMalware Crypters – the Deceptive First Layer
Recently, two suspects were arrested for selling Cryptex Reborn and other FUD tools (helping to install malware in a Fully UnDetectable way). Today, we will study some examples to make sure that...
View ArticleAn Introduction to Image File Execution Options
Image File Execution Options (IFEO) are used for debugging. Malware, however, does not only check if there are debuggers active, but it’s also known to use the features IFEO has to offer to their own...
View Article
More Pages to Explore .....