MALWARE CHALLENGE II
This report covers two malware challenges: RAT.Unknown2.exe putty.exe from the SillyPutty challenge The RAT.Unknown2.exe Basic Static Analysis File hashes C:\Users\sire\Desktop λ sha25...
This report covers two malware challenges: RAT.Unknown2.exe putty.exe from the SillyPutty challenge The RAT.Unknown2.exe Basic Static Analysis File hashes C:\Users\sire\Desktop λ sha25...
The RAT.Unknown.exe Instructions Analyst Excellent work with the last sample. Please take a look at the one in this directory. Our IR team said it might have command execution capabilities, but ...
This report is based on my hands-on analysis of a malware sample, following my previous static analysis. In this phase, I wanted to see what the malware actually does when executed, rather than ju...
In this lab, I explored out a basic static malware analysis on a suspicious Windows executable without running it. The goal was to collect useful indicators early, understand what the sample might ...
Objective The goal of this attack is to use packet spoofing to launch an ARP cache poisoning attack so that when two victim machines (A and B) communicate, their traffic is redirected through the ...
Packet Sniffing & Spoofing with Scapy A Hands-On Networking Lab (Controlled Environment) In this lab, I explored how network packets can be captured, inspected, and crafted using Scapy in a co...
UDP Sockets with Python – Simple Send & Receive Examples This guide shows basic UDP client and UDP server implementations in Python, plus how to quickly test both directions using netcat (nc)....
🤖 Web LLM Attacks: Exploiting Large Language Model APIs This report documents several successful exploits against a web application utilizing a Large Language Model (LLM) with access to various ba...
Basics of SQL Introduction to SLQ Logging onto the mysql and then checking the database we have root@9c6e27fbb603:/# mysql -u root -p Enter password: Welcome to the MySQL monitor. Commands end ...
Cross-Site Scripting Attack (XSS) This report explores web security vulnerabilities by demonstrating three types of Cross-Site Scripting (XSS) attacks on a website popular around 2005. The attacks...