Chris EastwoodLab 6 — C Code Constructs in AssemblySolutions for Lab 6 within Practical Malware Analysis.Jan 2, 2022Jan 2, 2022
Chris EastwoodLab 5 — IDA ProSolutions for Lab 5 within Practical Malware Analysis.Dec 29, 20212Dec 29, 20212
Chris EastwoodMalware Detection with YARAOne of the important aspects of digital forensics and investigation is the identification and classification of potential malicious…Nov 5, 2020Nov 5, 2020
Chris EastwoodBattery Powered Trojan — Part 3Taking a deeper look into Arucer.dll and uncovering what it does and how to use it.Aug 11, 2020Aug 11, 2020
Chris EastwoodBattery Powered Trojan — Part 2Take what we’ve found and perform basic analysis on the uncovered Arucer.dllJul 21, 2020Jul 21, 2020
Chris EastwoodBattery Powered Trojan — Part 1Trojan backdoor found within Energizer Duo USB battery charger software downloads (2010).Jul 21, 2020Jul 21, 2020
Chris EastwoodBasic Dynamic AnalysisSolutions for Lab 3 within Practical Malware Analysis.May 4, 20191May 4, 20191
Chris EastwoodBasic Static AnalysisSolutions for Lab 1 within Practical Malware Analysis.May 4, 2019May 4, 2019