Some interesting stuffs (blogs/articles/papers and useful resources) that I’ve read in Q2 2017.


8 cyber security professionals share their essential reads

Infosec Newbie

Ransomware Prevention

Wiki to collect Red Team infrastructure hardening resources

Using APT tactics and techniques in your pentests

Shadow Brokers EQGRP Lost in Translation resources

The Shadow Brokers-Leaked Equation Group’s Hacking Tools: A Lab-Demo Analysis

Chronicles of a Threat Hunter: Hunting for In-Memory Mimikatz with Sysmon, Win Event Logs, and ELK

Stuxnet drivers: detailed analysis

Pegasus for Android: the other side of the story emerges

MOONLIGHT MAZE – The Dawn of Nation-State Digital Espionage

Technical details on the Lazarus Group and the SWIFT bank attacks

iOS Dualboot

Android Applications Reversing 101

Setting a custom FileVault (macOS FDE) passphrase

New Apple Filesystem (APFS) Reverse Engineered

HTTP/2 is not the future, it’s present

Phishing with Unicode Domains

All Your Cards Are Belong To Us: Understanding Online Carding Forums

We are ex-NSA crypto/mathematicians working to help keep the internet secure before quantum computers render most crypto obsolete!

A Comparison of Encryption Tools for Disk Data Storage from Digital Forensics Point of View

What convolutional neural networks look at when they see nudity

Making a Simple Neural Network

Windows 10 Security Wiki

From Engineer to Manager: keeping your technical skills

A Healthy Programmer is a Happy Programmer


WannaCry Ransomware

Notes about smb vuln ms17 010

A guide to journalists interviewing infosec specialists and hackers

HTTPS on Stack Overflow: The End of a Long Road

How Snowden distributed copies of his cache in parcels delivered through the US Postal Service

Digital Forensics – Automotive Infotainment and Telematics Systems

Introduction to few anti-forensics and unpacking techniques

PowerShell for Practical Purple Teaming

Blockchains from the ground up

Why mail() is dangerous in PHP

DOUBLEPULSAR Usermode Analysis: Generic Reflective DLL Loader

An Analysis of Criminal Communications Strategies

State-sponsored attack scenario on WhatsApp

Wicked malware persistence methods

How to build your own VPN if you’re (rightfully) wary of commercial options

Under The Hood Of Google’s TPU2 Machine Learning Clusters

Why you don’t need 27 different passwords

Why SHA-3 should probably not be used


The Journey to Hijacking a Country’s TLD – The Hidden Risks of Domain Extensions

The Principles of a Subdomain Takeover

Memory forensics of Eternalblue

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

Winning the debate on encryption — a 101 guide for politicians

Machine Learning Cheat Sheets

Security in Docker: More than containers

Set up your own malware analysis lab with VirtualBox, INetSim and Burp

Malware Lab Setup

10 tough security interview questions, and how to answer them

List of all products where vendor states SMB1 required.

War driving for IMSI catchers

Tracking US Navy nuclear submarines using publicly available information

A Security Review of Freelance Web Development

A Method For Verifying Integrity And Authenticating Digital Media

The collection of Red Teaming Tips by @vysecurity

Detecting Lateral Movement through Tracking Event Logs

Securing your laptop for travel to China

Detect the undetectable with Sysinternals Sysmon and Powershell logs

Tweak your sandbox to make it harder for malware to detect that it’s being analyzed – Cheat sheet PDF

NTFS Forensics Malware and vulnerabilities

RAM Forensic Analysis

Petya Ransomware

Petya: easily disabling access to psexec

Ransomware Chronicle

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s