Today I find it necessary to move away from the technical side of this website to an opinion piece. I have been in the cybersecurity…
Posts published in “Malware”
This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend…
In this last post of the zip bombs series, I’m going to tell you about a new method that has emerged in the last month:…
In last week’s post I introduced the zip bombs and explained how to create a zip bomb using the recursion technique. I recommend that you…
When a file is compressed, its size is reduced. It’s based on a simple principle: if you have a file with the text “aaaaaabbb”, which…
Recently I am doing some very interesting Pentester Academy courses. Thanks to them I am learning a lot, since they deal with very particular topics…
In this post we will talk about how one of the oldest computer attacks occurs: buffer overflow. A buffer overflow occurs when a program has…
We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of…