Pavel RichtarikJan. 23, 2020
[-]

Analysing Suspicious File "Outstanding Payment.jar" - Part 3

What is the actual functional equipment of the malware under investigation, and what options does it offer to the attacker if successfully implemented? If there is an infection, is it enough to delete one file or is a complete system reinstallation required? The final part of the three articles on the analysis of a suspicious Java file discusses the very core of the malware and its individual components.

Lukáš AntalJan. 13, 2020
[-]

Bash Bunny – Guide

In this article, we will discuss detail a very interesting device called Bash Bunny in detail. Let’s take a look at how to obtain, configure, write your own custom payloads, and use the Bash Bunny to launch effective attacks.

Martin FojtíkDec. 31, 2019
[-]

Social Networks, New Platform for Social Engineering Attacks

Social networks allow us to connect with people from all over the world in almost no time. These platforms have changed the way we interact with others. In earlier times, the first thing we did in the morning was to buy a newspaper to see what happened in the world around us, but today, most of us just check our social media accounts. This is our connection to the world today. Just one click and we can see pictures from exotic places and watch videos of small cute kittens. These networks connect us with the world in a way previously unthinkable. But along with all the goods things they offer (speaking mostly about the kittens), there are also coming threats and new attack vectors that evil social engineers would be happy to use to their advantage. Nowadays, it is therefore necessary to be wary of the ever present scams on social networks. Now, let’s take a look at the most common scams used by social engineers, and also how to defend against these types of attacks.

Pavel RichtarikNov. 27, 2019
[-]

Analysing Suspicious File "Outstanding Payment.jar" - Part 2

How to use static analysis for cracking the encryption used by the author of the malware, and what information can be revealed about the author? The second part of an article on the analysis of a suspicious Java file out of three describes the penetration of another protective layer and partially uncovers the attacker.

Lukáš BendíkAug. 31, 2019
[-]

Compromising Domain Accounts by Exploiting the Wi-Fi Network

Can it be easy to compromise domain accounts of users in an enterprise by exploiting the Wi-Fi connection to the internal network? If the devices are not configured correctly, it really can be a relatively simple task. In this article, we will take a look at different ways of compromising these networks, configuring the correct settings, and the differences in how different operating systems connect to these networks.