John KivuvaUnpacking Dridex malware using x32debug and ProcessHackerMalware UnpackingAug 8, 2023Aug 8, 2023
John KivuvaBinary Analysis — C complication ProcessThe compilation of a C program is the process of converting human-readable C code into executable machine code (Binary). The process…Jul 13, 2023Jul 13, 2023
John KivuvaEnhancing Cybersecurity Preparedness: MajorTop Solution’s Incident Response PlanThis article was derived from a project submitted to the University of Maryland Global Campus(UMGC) as part of my Masters of Science…May 24, 2023May 24, 2023
John KivuvaUsing Oletools and oledump.py to analyze malicious Macro documents.Oletools is a collection of python scripts for analyzing Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format…Feb 11, 2023Feb 11, 2023
John KivuvaWindows Registry ForensicsForensic artifacts in the Windows registry can provide valuable information for forensic investigators. The registry is a hierarchical…Jan 4, 2023Jan 4, 2023
John KivuvaThe Security of BGPOn May 2, 2022, Reuters reported that Russia was rerouting internet traffic in occupied Ukraine to its infrastructure. On July 27, 2022…Oct 29, 20221Oct 29, 20221