Security oriented blog

SLAE Assignment #6 | Polymorphic shellcode

Assignment #6 in the SLAE exam is to create polymorphic versions of 3 shellcodes from shell-storm.

SLAE Assignment #3 | Egg Hunter

Assignment #3 in the SLAE exam is to create an egg hunter with configurable payload.

The Threat Matrix | Book review

The Threat Matrix written by Garrett M. Graff is a comprehensive summary of the FBI history in regards to the War on Terror.

Naming function pointers with BinaryNinja

Almost at the start of Pony version 1.9 an import function is called to load specific functions from dll’s and store them in an array.

Hacking ISIS | Book review

The book “Hacking ISIS: How to Destroy the Cyber Jihad” written by the two terrorist experts Malcolm Nance and Christopher Sampson is written to give an insight how ISIS operates over the internet domain in regards to actions such as recruiting, media-propaganda and hacking.

Deobfuscating Pony version 1.9 with BinaryNinja

Looking for malicious samples to analyze I had a look at Pony version 1.9 which sourcecode was leaked a couple of years ago.

Om Svensk Underrättelsetjänst | Book review

I recently finished reading the book “Om Svensk Underrättelsetjänst”(About Swedish Counter-Intelligence) written by the author Jan-Olof Grahn who was head over the military oriented part of the Swedish National Defence Radio Establishment during the later part of the cold war. The book is only available in Swedish but I will write the review in English for consistency.

SLAE Assignment #1 | Bind shell

This post is the assignment in the SLAE exam for recreating a bind shell shellcode.