JustAnother-EngineerReading Between the Lines of Code: Ziraat_StealerHello Everybody! Today i will be conducting an analysis of a .NET information stealer.5 min read·Apr 29, 2024--1--1
JustAnother-EngineerTypo Trouble: Exploring the Telegram Python RCE VulnerabilityTelegram’s Windows application was recently updated to address a critical zero-day flaw that permitted the execution of Python scripts…3 min read·Apr 20, 2024----
JustAnother-EngineerMy Journey with CRTO: A ReviewI’m excited to announce my recent achievement: successfully passing the Red Team Operator (RTO) exam offered by Zero Point Security. This…3 min read·Apr 11, 2024----
JustAnother-EngineerWindows Security: Using AMSI to Analyze Malicious JavaScriptAMSI : Anti-Malware Scan Interface3 min read·Feb 21, 2024----
JustAnother-EngineerThe Ping of Death: How ICMP Packets Can Be Used for Data Ex-filtrationSuppose you are a system administrator for a big business and you just found out that a third party has obtained some of your confidential…4 min read·Feb 1, 2024----
JustAnother-EngineerCode caving attacks: How Hackers Stitch Together CodeCode caving attacks usually exploit unused memory areas in legitimate programs, by concealing malicious code with sophistication. This form…4 min read·Jan 12, 2024----
JustAnother-EngineerThe Art of Obfuscation: Evading Static Malware Detection4 min read·Dec 25, 2023----
JustAnother-EngineerUnmasking NJRAT: A Deep Dive into a Notorious Remote Access Trojan Part2In the first part of this blog series, we discussed how the malware NjRAT is built , its capabilities and more.In this blog we will…5 min read·Nov 26, 2023----
JustAnother-EngineerOpening HTML Files : A gateway to MalwareThis blog post examines how the ability to run VBscript / Jscript from HTML files in windows environment is being abused.This post is…5 min read·Nov 10, 2023----