Quantcast
Channel: All Things Dev – Malwarebytes Labs
Browsing all 13 articles
Browse latest View live

Anonymizing VM Traffic (Introduction)

WARNING: The information included in this tutorial could be used for malicious purposes in the wrong hands, please expect to be yelled at by people who think you are a bad guy if you start talking...

View Article



Image may be NSFW.
Clik here to view.

Anonymizing Traffic for your Host System

Security Level: Light Purpose: To hide who you are while performing research through your browser. Benefits:Hide your IPEasy to set upCan be run off of a USB stickDrawbacks:Drive-by attacks can still...

View Article

Image may be NSFW.
Clik here to view.

Anonymizing Traffic For Your VM

Security Level: MediumPurpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks.Benefits:Hide your IPProtect the host...

View Article

Image may be NSFW.
Clik here to view.

Anonymizing Traffic for your VM And Capturing Traffic

Security Level: High / HardcorePurpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform...

View Article

Image may be NSFW.
Clik here to view.

Oh, the Sites You Will Never See

Staying safe online requires more than just avoiding web-sites that look untrustworthy. These days, you might be redirected and/or infected with malware by the advertisement banner showing on a...

View Article


Image may be NSFW.
Clik here to view.

DEFCON 21: An Odyssey

If you read my post last week about some of the Malwarebytes team heading out to Las Vegas for DEFCON 21 then you might be interested in how it went. Well, rather than doing what I did last year and...

View Article

Image may be NSFW.
Clik here to view.

Memory scan

Memory Scan You may have noticed this line in a Malwarebytes Anti-Malware log “Memory : Enabled”  or looked at  the setting shown below. To explain why you would want Malwarebytes Anti-Malware, or your...

View Article

Image may be NSFW.
Clik here to view.

Open Source Laptop

A couple of months ago, I watched the live stream of the Chaos Computer Club with one of the talks called  “The Exploration and Exploitation of an SD Memory Card”. It was given by Sean “xobs” Cross and...

View Article


Image may be NSFW.
Clik here to view.

UEFI, SecureBoot, and dual booting Windows 8 and Linux

In this post I will explain UEFI (Unified Extensible Firmware Interface) and its predecessor, the BIOS/MBR, as well as the challenges to get a dual boot environment with an alternative operating...

View Article


Image may be NSFW.
Clik here to view.

Goodbye CD Wallet. Hello ISOSTICK!

The ISOSTICK is a USB stick that masquerades as an external CD/DVD drive and loads ISOs from a removable MicroSD card. Many of our readers are the tech support, help desk and IT department for their...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Alternate Data Streams

What are Alternate Data Streams? Alternate Data Streams (ADS) are a file attribute only found on the NTFS file system. In this system a file is built up from a couple of attributes, one of them is...

View Article

Image may be NSFW.
Clik here to view.

Malware Crypters – the Deceptive First Layer

Recently, two suspects were arrested for selling Cryptex Reborn and other FUD tools (helping to install malware in a Fully UnDetectable way). Today, we will study some examples to make sure that...

View Article

Image may be NSFW.
Clik here to view.

An Introduction to Image File Execution Options

Image File Execution Options (IFEO) are used for debugging. Malware, however, does not only check if there are debuggers active, but it’s also known to use the features IFEO has to offer to their own...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images