Shell hiding in image files
One day, we noticed strange GET request towards our JBoss server: From the request above, you’ll quickly noticed that this attack leveraging Apache Struts vulnerability from CVE-2017-5638. The request tried…
One day, we noticed strange GET request towards our JBoss server: From the request above, you’ll quickly noticed that this attack leveraging Apache Struts vulnerability from CVE-2017-5638. The request tried…
All reference is taken at here: https://github.com/simsong/bulk_extractor/wiki/Installing-bulk_extractor bulk_extractor is a computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without…
For this analysis, we’ll using Python3 that bundled with Dionaea: Running command above will open a Python console. Enter the code below line by line: It will produce test.bin file…
Thug is a Python low-interaction honeyclient aimed at mimicking the behaviour of a web browser in order to detect and emulate malicious contents. It based on Python + V8 JS…
scrub overwrites hard disks, files, and other devices with repeating patterns intended to make recovering data from these devices more difficult. Although physical destruction is unarguably the most reliable method…