Home
MrEmpy
Cancel

02 Apt Techniques: Html Smuggling

A few years ago, NOBELIUM APT, or APT29, were using a technique known as HTML Smuggling, which allowed them to deliver malicious software, such as banking trojans, through the legitimate resource...

01 Apt Techniques: Attacks Using Office Macros

In recent years, a new technique has been discovered by threat researchers that are being used by various APTs such as FIN7, BlackEnergy and APT37. What is an APT? An advanced persistent threat...

02 Binary Exploitation: Format String Vulnerability

Format String is a type of software vulnerability discovered around 1989 that could be used in security exploits. Originally thought to be harmless, format string exploits can be used to crash a ...

01 Binary Exploitation: Buffer Overflow Introduction

Buffer Overflow is one of the oldest faults in the history of computing, and to this day, it’s been a problem, but not as often as before. These buffer overflow vulnerabilities can occur in many ...

2 Ways To Dump Lsass Without Mimikatz

Local Security Authority Subsystem Service, or better known as LSASS, is one of the core software of a Windows server. It is responsible for enforcing the security policy on the system. It verifi...

Banking Trojan Uses Legitimate Avira Executable To Steal Data From Brazillians

In the year 2021, a wave of email phishing attacks were made, the trojan named as Javali is one of them. It was mainly distributed in Latin America, and it is a banking trojan. The malware uses a...

Analyzing Petya Ransomware

Hello hackers! In this article I will analyze the Petya ransomware that I found while browsing my social networks. Hope you like the article. What is Petya ransomware? Petya is a family of encry...