My Writing
- Malware Analysis Version 3 Release of the REMnux Linux Distro for Malware Analysis
- Incident Response Incident Response on 64-Bit Windows Using 32-Bit Tools Windows' WOW64 File System Redirector transparently redirects 32-bit tools accessing System32 to SysWOW64, causing forensic investigators to examine the wrong files without realizing it. Stick to...
- Communication Balancing Brevity and Verbosity in Business Communications Brevity is usually the right call. The harder skill is knowing when to go long.
- Tools Extracting Malicious Flash Objects from PDFs Using SWF Mastah SWF Mastah by Brandon Dixon extracts malicious Flash objects from PDFs in one step, using the PDF X-RAY framework and Peepdf. It can handle complex PDF files even when pdf-parser fails to locate or...
- Malware Analysis Preparing The Next Release of REMnux Distro
- Malware Assigning Descriptive Names to Malware - Why and How? Security researchers assign descriptive names to high-profile malware based on file names, registry keys, or embedded strings—whoever coins the name that sticks gets bragging rights. Duqu was named...