Muhammad HaroonBlue Team Challenge Writeup: Injection Series Part 4-Reverse Engineering MalwareReady to start dissecting malware!! 🕵️♂️ We’re jumping into the ‘Injection Series Part 4’ challenge from Blue Team Labs. This challenge…Jan 27Jan 27
Muhammad HaroonLets Defend: 0-Day MSHTML Challenge WriteupGet ready to explore the world of dissecting tricky files connected to the ‘2021’s 0-Day MSHTML’ vulnerability. Let’s work together to…Jan 201Jan 201
Muhammad HaroonLets Defend: Malicious VBA Challenge WriteupReady to dive into the world of malicious VBA code analysis? Let’s tackle this challenge together! 🕵️♂️Jan 4Jan 4
Muhammad HaroonCyber Kill Chain vs. Diamond Model: Proactive Defense Against CyberattacksCyber Kill Chain and the Diamond Model are different frameworks (helpful) in helping both to understand and analyze the steps that a…Dec 30, 2023Dec 30, 2023
Muhammad HaroonLets Defend: Ransomware Attack Challenge WriteupLets Defend Ransomware Attack challenge! This challenge provided me with a memory dump extracted from a compromised machine, and I had to…Sep 26, 2023Sep 26, 2023
Muhammad HaroonFlare-VM Sandbox Guide: Creating an Isolated Lab Environment for Malware Analysis & Reverse…🛡️Your Key to a Secure Sandbox for Malware Research🔍Sep 21, 2023Sep 21, 2023