Kols

08
Mar

Populating Azure environment with test data

I was trying to get access to the Microsoft Developer Program simply because they allow you to load in a
3 min read
03
Nov
Cloud security - Got Milk? IAM enumeration and S3 compromise

Cloud security - Got Milk? IAM enumeration and S3 compromise

(__) (oo) /------\/ "Moo-ving to S3!" / | || * /\---/\ ~~ ~~ References: The IAM policies and commands used in this scenario were based
5 min read
02
Sep
Malware analysis - .NET - Backdoor GlobalProtect application

Malware analysis - .NET - Backdoor GlobalProtect application

Sample * Name: Setup.exe * SHA256: e3880c7db78e09748fe9caf02f330b1c61cd3aaaa31ffe93fb5ba1fb1035f761 References * Trend Micro: https://www.trendmicro.com/en_us/research/24/h/threat-actors-target-middle-east-using-fake-tool.html
7 min read
27
Aug
Cryptography in malware - RSA/DiffieHellman/ECC

Cryptography in malware - RSA/DiffieHellman/ECC

Objectives * Provide an overview of fundamental RSA/DiffieHellman/ECC concepts in an easy to digest format. * Provide a reference for
26
Aug
Cryptography in malware - Salsa/ChaCha fundamentals - Cheatsheet

Cryptography in malware - Salsa/ChaCha fundamentals - Cheatsheet

Objectives * Provide an overview of fundamental Salsa/ChaCha concepts in an easy to digest format. * Provide a reference for later
24
Aug
Cryptography in malware - AES fundamentals - Cheatsheet

Cryptography in malware - AES fundamentals - Cheatsheet

Objectives * Provide an overview of fundamental AES concepts in an easy to digest format. * Provide a reference for later review
24
Aug
Cryptography in malware - Fundamental concepts - Cheatsheet

Cryptography in malware - Fundamental concepts - Cheatsheet

Objectives: * Provide an overview of fundamental cryptography concepts in an easy to digest format. * Provide a reference for later review