Category Archives: Tutorials

12 Sep

Email Header Analysis – Find out Received Email is Genuine or Spoofed

Email is a business critical asset.Altering email header to make the message appear to come from somewhere other than the actual source is a fraudulent email. If the spam filter is bypassed a receiving the mail to inbox can be the critical impact to the organization.This makes an organization open door to attacks like social

Read More
04 Aug

Find Evil ~ Know Normal [Malware Hunting]

Find Evil – Know Normal Knowing what’s normal on a Windows host helps cut through the noise to quickly locate potential malware. Use the information below as a reference to know what’s normal in Windows and to focus your attention on the outliers.

Read More
04 Aug

Portspoof

Portspoof – Spoof All Ports Open & Emulate Valid Services The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port. As a result, any attackers port scan results will become fairly meaningless

Read More
03 Oct

THE CRYPTER BIBLE

Crypter Bible Everything you need to know. We explain features, options, settings, basic knowledge, detections, how to not ruin your stub and ultimately how not to annoy the crypter owner. Terms & Definitions RunPE RunPE is the piece of code made to Inject the Payload into the memory of the chosen process. Injection The process

Read More
31 Dec

What are DDoS attacks? DDoS Explained

What is DDoS?   HTTP Flood Attacks   DNS Amplification Attacks   THC-SSL-DOS Attack Tool   Slowloris DDoS Attack Tool   R-U-Dead-Yet, RUDY DDoS Attack Tool   Optima Bot   Counterattacks: Changing the Dynamics of a Cyber attack

Read More