INTfinity ConsultingMalware Analysis Series 4 — Behind the screen of a SpyNote C2 operatorThis article will cover what a SpyNote C2 operator will see on an infected phoneMar 7Mar 7
INTfinity ConsultingMalware Analysis Series 3 — DBS Rewards Scam MalwareAnalysis of DBS Rewards Scam Android MalwareFeb 1Feb 1
INTfinity ConsultingMiscellaneous series 1 — Writing malicious plugin for ConfluenceIntroductionDec 7, 2023Dec 7, 2023
INTfinity ConsultingMalware Analysis Series 2 — Recovering corrupted IL the manual wayObtain MSIL via windbg and patch the C# binary via dnlibSep 5, 2023Sep 5, 2023
INTfinity ConsultingMalware Analysis Series 1 — Will Donut’s generated shellcode ever fail?IntroductionAug 3, 2023Aug 3, 2023
INTfinity ConsultingYet Another Series? — Malware Analysis SeriesIntroductionJul 31, 2023Jul 31, 2023
INTfinity ConsultingFortinet Series 3 — CVE-2022–42475 SSLVPN exploit strategyIn this article, we will attempt to explain the program flow, document the heap allocation pattern observed and the strategy to exploit theJul 2, 2023Jul 2, 2023
INTfinity ConsultingFortinet Series 2 — Analysis of SSLVPN exploit (CVE-2022–42475)IntroductionMay 26, 2023May 26, 2023