Jump to content
×
×
  • Create New...

MRMIME

Members
  • Posts

    5
  • Joined

  • Last visited

About MRMIME

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

MRMIME's Achievements

Rookie

Rookie (2/14)

  • One Month Later
  • Dedicated
  • Reacting Well
  • Week One Done
  • Conversation Starter

Recent Badges

6

Reputation

  1. Hi Fam !!! 😷😷💫❣️Hope everyone's doing good today. In my previous post I tried to give you a quick and brief introduction to Malware Analysis, today we're going to dive a little deeper and let the knowledge sink in through our nerves. So without any further ado lets get started. Generally, there are four types of Malware Analysis which are classified on the criteria of their analysis techniques. Which are listed as follows :- Static Analysis Dynamic Analysis Hybrid Analysis Code Analysis Memory Forensics Static Analysis : Static Analysis is a procedure of analyzing a binary without actually executing it. It is the easiest to perform and allows to extract the "metadata" associated with the suspect binary. This can be useful in those cases where the analyst need to pinpoint the malicious infrastructure, libraries and the packed files. In addition, tools like disamblers and network analyzers can be drawn on to collect those "information" or "how the malwares actually work". Dynamic Analysis : Dynamic Analysis is additionally known as by the term Behavioral Analysis. It is a method of executing a suspect binary in a complete isolated habitat and monitoring its behavior and demeanor. This=comes in handy but there's a drawback that it does not reveal all the functionalities of a hostile program. Dynamic Analysis provides, threat hunters and incident responders with deeper visibility allowing them to cover the true intent and nature of the threats. Hybrid Analysis : Now the Term "Hybrid" is preety self explanatory. Yes, it used the above two techniques (i.e Static and Dynamic) by combining them for its higher efficiency and providing the best approach. It helps in the cases when sophisticated malwares are coded so as to camouflage and conceal itself from the presence of sandbox technology. Code Analysis : This technique is quite advanced and focuses on analyzing the code from its "inner workings" of the binary. This technique also disclose and babble that is impossible to determine from Static and Dynamic Analysis. Code Analysis are again divided into two more category namely they are: static code analysis dynamic code analysis Memory Forensics : Memory Forensics is also known as Memory Analysis. It is a reference to the examination of volatile data in computers memory dump or investigating computers RAM for memory artifacts. It is more like a forensic technique for security professional to scrutinize and identify that do not leave any tract in computers Hard Drive. We shall discuss the Code Analysis and Memory Analysis in our subsequent chapters. ~~ With Best Regards MRMIME HAPPY LEARNING
  2. Hi Fam! 😷😷Today we're gonna talk about a term we have preety much come across or heard about it in the field of Digital Security i.e "Malware Analysis" well by word we can estimate it quickly. Basically, its actually a field of study in Cyber Security of how Malwares perform. Now the word "Malware" is actually a Collective term for Viruses, Trojan Horses, Rootkits,Spyware. This Malwares now have different functionalities which depends on the intent of coding. The elemental and basic purpose it to harm the host OS and steal their Credentials be it Huge Organizations and Huge Companies or even a normal user.The goal of malware analysis is to determine the capability of malware, detect it, and contain it. It also helps in determining identifiable patterns that can be used to cure and prevent future infections. There are a few key reasons to perform malware analysis: Malware detection — To better protect an organization, you need to be able to identify compromising threats and vulnerabilities. Threat response — To help you understand how these threats work so you can react accordingly to them. Malware research — This can help you to better understand how specific types of malware work, their orientation and what differentiates them. Here are few of the Best Malware Analysis Tools and Their Features Fiddler. WireShark. x64dbg. PeStudio. Process Hacker. Process Monitor (ProcMon) ProcDot. Autoruns. With BEST REGARDS ~~ MRMIME
  3. CTF(Capture The Flag) - Hack the Box 👩‍💻♥️💫✨ If you are looking for opportunities to expand your horizons and learn more about digital security. Then CTF is probably the Stuff you should give it a Try & HTB(Hack the Box) is one such example. Here I'm going to Share the Top Pentesting Labs you should Venture and Aim for if You are having an higher level of Appetite. ~ With Best Regards MR.MIME ✌️💫 Happy Learning
  4. CVE-2021-42008 The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.