reverse-engineering
This note was published in May 2014. A newer revision of the REMnux distro has been released since then. Please see the...Read more
In the field of IT in general and digital forensics in particular, you become obsolete the moment you stop learning. Here...Read more
This note was published in April 2013. A newer revision of the REMnux distro has been released since then.I’m pleased...Read more
This note was published in December 2011. A newer revision of the REMnux distro has been released since then.I’m...Read more
When performing behavioral analysis of malware, it’s not uncommon to switch between networks. You might need to be...Read more
Nir Sofer makes a number of Windows utilities, which he distributes for free on the NirSoft website. This post takes a quick...Read more
Process Monitor is a free tool from Microsoft that displays file system, registry, process, and other activities on the...Read more
Attackers continue to use malicious PDF files as part of targeted attacks and mass-scale client-side exploitation. Peepdf, a...Read more
In an earlier post I outlined 6 free local tools for examining PDF files. There are also several handy web-based tools you...Read more
Malicious PDF files are frequently used as part of targeted and mass-scale computer attacks. Being able to analyze PDFs to...Read more