Media is too big
VIEW IN TELEGRAM
SOC Analyst Training: How to Analyze Malicious PDFs
In this webinar we show:
• Overview of the PDF file format
• Attack vectors and techniques using PDF files
• How investigators can detect and analyze potentially harmful PDF files
• Learn how Intezer analyzes all types of files and helps in malware analysis investigations
• A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
🌐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
🖥blog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
📡@hackLabel
In this webinar we show:
• Overview of the PDF file format
• Attack vectors and techniques using PDF files
• How investigators can detect and analyze potentially harmful PDF files
• Learn how Intezer analyzes all types of files and helps in malware analysis investigations
• A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
🌐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
🖥blog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
📡@hackLabel
❤3👍1
This project is an open-source framework to enable obfuscation of constants, variables, and strings.
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
📡@hackLabel
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
📡@hackLabel
❤2
phrack
specialized Issues for hacking
Be sure to check : http://www.phrack.org/issues/70/1.html
📡@hackLabel
specialized Issues for hacking
Be sure to check : http://www.phrack.org/issues/70/1.html
📡@hackLabel
Assembly Refresher . Shellcode Injection . Exploitation Scenarios . Reverse Engineering . Return Oriented Programming . Advanced Exploitation . Memory Errors . . .
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
📡@hackLabel
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
📡@hackLabel
❤3
https://crackmes.one/ for increase your skills in reverse engineering and hacking.
discord: https://discord.com/invite/2pPV3yq
📡@hackLabel
discord: https://discord.com/invite/2pPV3yq
📡@hackLabel
👍5❤2
This media is not supported in your browser
VIEW IN TELEGRAM
☢️reverse engineering course☢️
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
📡@hackLabel
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
📡@hackLabel
❤3👍3🤡1
This media is not supported in your browser
VIEW IN TELEGRAM
How to create a SIM card dump for reverse engineering
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
📡@hackLabel
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
📡@hackLabel
👍2❤🔥1🔥1😱1
Media is too big
VIEW IN TELEGRAM
Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
📡@hackLabel
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
📡@hackLabel
❤4❤🔥1👍1
The Forensics Wiki is an open source website providing information related to digital forensics. The articles on the website cover a wide range of information from tools used during investigations to papers people and organizations that contribute to the field.
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
• Transitioning Forensics Wiki to GitHub
• Contributions Forensics Wiki on MediaWiki
📡@hackLabel
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
• Transitioning Forensics Wiki to GitHub
• Contributions Forensics Wiki on MediaWiki
📡@hackLabel
❤1👌1
• Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals
• Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
• Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
📡@hackLabel
• Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
• Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
📡@hackLabel
IMSI-catcher
This program shows you IMSI numbers, country, brand and operator of cellphones around you.
/!\ This program was made to understand how GSM network work. Not for bad hacking !
github: https://github.com/Oros42/IMSI-catcher
📡@hackLabel
This program shows you IMSI numbers, country, brand and operator of cellphones around you.
/!\ This program was made to understand how GSM network work. Not for bad hacking !
github: https://github.com/Oros42/IMSI-catcher
📡@hackLabel
❤2🔥1😍1