April 2012 Blog Posts (1)

The Cuckoo Sandbox written by Leon van der Eijk

Performing malware analysis, either static and/or dynamic can be an exciting but daunting task. The sheer amount of malware can be overwhelming at times. Between all the polymorphing Conficker junk that gets caught using, for example, the dionaea honeypot really exciting stuff can be found.

But relying solely on sites like Anubis, CWsandbox or Virustotal for dynamic analysis isn't always a good idea. Let alone the situations thinkable that prohibit the use of them, either by company policy… Continue

Added by Jayson E. Street on April 5, 2012 at 1:55am — No Comments

Latest Activity

Matt Parkinson is now a member of Dissecting The Hack
5 hours ago
d3tm4r posted a blog post

Threat Modeling Card Game "Elevation of Privilege (EoP)"

Many people don't know or haven't heard of threat modeling let alone know how to do it.Hackers and crackers break assumptions we have made for how a system will be used.But how to make the right assumptions? One way is to predict evil based on past known threats.This might be a good start but it's not enough because hackers will also break the assumptions we make based on past attacks and change their behavior. The better assumption is that all input is potentially hostile and has to be treated…See More
14 hours ago
amy link posted a status
"I’m an essay writer, so if you need my help, do not hesitate to contact me at custom-paper-writing.org I’ll be glad to help you)"
Thursday
Travis Havey is now a member of Dissecting The Hack
Wednesday

© 2015   Created by Marcus J. Carey.   Powered by

Badges  |  Report an Issue  |  Terms of Service