Security oriented blog

Impressions of different study sources

This post is a summary of impressions from book reads, documentaries and other sources of information I get exposed to in relation to the study of subjucts such as intellligence, foreign-policy, terrorism, cyber-security and more.

Exploring the (Emer|Name)coin namesystem with Maltego transforms

After implementing a Maltego transform for exploring IPs and domains which is or has been used in the namesystem for Emercoin and Namecoin I will here show a few graphs where it has been used.

The Battle for Syria | Book review

After reading The Battle For Syria: International Rivalry In The New Middle East written by Christopher Phillips I will here provide a few comments on the book.

Ghost Wars | Book review

The book Ghost Wars written by Steve Coll explains the civil war of Afghanistan starting from the overthrow of the Soviet supported regime all the way to the day before 9/11.

Retefe unpacker

This is a writeup on the packing technique used by current versions (at the time of publication) of the banking malware Retefe.

Two books about Mossad

After finishing two quite different books on the history of the Israeli intelligence agency Mossad I will provide my impressions of the books and outline their differences and strengths.

Finding cyclic user behavior on Pastebin

Inspired by all the Threat Hunting going around lately I’ve tried to apply it towards Pastebin posts, with the question: “What cyclical activity can I find and what does it revolve around?”.

SLAE Assignment #2 | Reverse shell

Assignment #2 in the SLAE exam is to create a exec reverse shell shellcode.