Dawid BolkowskiMalware analysis: GuLoader — from VBS to keyloggerFrom VBS to keylogger: GuLoader adventure — debugging of malicious Powershell scriptMay 7May 7
Dawid BolkowskiMalware analysis/Digital forensic: Strela StealerAnalysis and reverse engineering of Strela Stealer + forensic investigation after running it as a regular userDec 19, 2023Dec 19, 2023
Dawid BolkowskiSysInternals [CyberDefenders write-up using SIFT and Windows]Write-up using SIFT and Windows to a great CyberDefenders lab called SysInternalsSep 27, 2023Sep 27, 2023
Dawid BolkowskiMalware analysis/Digital forensics: NETSupport RATFrom obfuscated JavaScript to NETSupport RAT — malware analysis and forensic investigation after running it as a regular userAug 30, 2023Aug 30, 2023
Dawid BolkowskiExceltium [BTLO Write-up]Write-up with answers to a great BlueTeamLabsOnline investigation called Exceltium.Jul 26, 2023Jul 26, 2023
Dawid BolkowskiExtraction and analysis of injected shellcodeExtraction and analysis of x64 shellcode injected into another process with use of static/dynamic malware analysis methodsJul 19, 20231Jul 19, 20231
Dawid BolkowskiDecrypting HTTPS phishing-website trafficAnalyzing phishing (credential stealer) website via intercepting and decrypting HTTPS trafficJun 28, 2023Jun 28, 2023