First Windows Malware Analysis - RAT
My First Windows Malware Analysis
So, after getting my first homelab setup I wanted to experiment with malware analysis :3
Reverse engineering student
So, after getting my first homelab setup I wanted to experiment with malware analysis :3
I have recently purchased an ACEMAGICIAN AM06PRO to use as a host for VMs as my Reverse engineering and Malware analysis small homelab.
It comes with 16GB of ram and a Ryzen 7 5825U (8C, 16T) and 512GB of M.2 SSD to which I added a 1TB Sata SSD.
I only added __declspec(noinline)
before every function in the header in order to prevent inlining
I decided to start documenting what I do when I reverse engineer things in my free time in order to start building a portfolio I can show to others.
My hope with this is to have tangible and proven experience to eventually move into the professional world of Reverse Engineering.
I reached the Hacker rank on Hack The Box Labs!
I am proud to announce that I have finally completed the Penetration Tester Path from Hack the box!
In this post we will explore a simulation of a possible attack that I have spotted in the wild. Given that by company policy I am not allowed to alter the original PCs, this will be a simulated environment using VMs recreated as loyally as possible to the original golden image.
Even after finding a full time job as an embedded software engineer I kept on dedicating my own time to learning more skills.
Thus, I am glad to add to my blog the certificate of completion for the Offensive Pentester path from Try Hack Me! 🚀
In my spare time, while waiting for my graduation and sending job applications, I decided to start working more towards my goals and getting at least the TryHackMe courses done. First one off the count: Jr. Penetration Tester
It was Very interesting and while a lot of the concepts were things I’ve already learned from CTFs, University or just messing around on my own I think the overall content and hands on approach of the rooms is something that compliments theory a lot and definitely gets you engaged and more understanding of what you learned.
Looking forward to continue growing in the vast space of Cybersecurity and possibly get more recognized certifications in the future :D
This post will describe how I found this vulnerability and give step by step instructions to follow.
It was found on September 19th on the Firmware version V22.03.02.20