Posts
Sahil Rawat
Cancel

Malware Analysis:Lemon Duck CryptoMiner (a.jsp) : Part II

This is the Second Article where we will be analyzing the LemonDuck malwar, [earlier] we analyzed the “mail.jsp” script which resulted in downloading and invoking of another script named “a.jsp”....

Gaining Access:Part II

Gaining Access:Part I

Gaining Access In this series we will start with various methods to get an initial foothold on the target system, We will look at various techniques to gain access to Computer devices(Devices like...

Gaining Access:Part III

Malware Analysis:Lemon Duck CryptoMiner (mail.jsp) : Part I

Today we will be analyzing a malware named LemonDuck which is a CryptoMiner malware, we will perform this analysis step by step and try to uncover what this malware does. You can find resources ...

Malware Analysis: Malicious Document File I

I am going to start a Malware Analysis Series, where i will take malware samples and analyze them step-by-step understanding what it does? This is the First article in the series where we will b...

Intro to CSRF:Cross Site Request Forgery

A CSRF vulnerability allows an attacker to unknowingly perform state changes on a web application where the victim is authenticated, CSRF does not allow data theft as an attacker cannot view the...

Demystifying XSS Attacks

XSS also Known as Cross-Site Scripting is a vulnerability that allows attackers to execute arbitrary javascript code on a victim’s browser. When a web application accepts the untrusted user data...

Everything you need to know about IDOR

IDOR is one of the most popular and common vulnerabilities, It occurs when an application provides direct access to objects based on user-supplied input. This allows a malicious attacker to acces...

Network Hacking:Part IV

This is the last post in our Network Hacking series, Here we would be learning about attacks on the router, changing the settings of the router, etc. Wireless Router Attacks We can directly att...