Category Archives: Privacy

Reconnaissance with Images

Hi Readers!! Lets see how the Images speak this time. Gathering data on a target is extremely important if we plan to execute an attack in a more efficient manner. A typical attack scenario starts with a long reconnaissance process. In this case “reconnaissance” refers to the gathering of information in any and all possible… Read More »

A malware analysis kit for the novice

Malicious software – or malware, as it is more popularly known — has a long history, and continues to evolve in terms of sophistication and stealth. Over the past two decades, replication and spreading mechanisms used in malware have advanced considerably, as have techniques used to prevent analysis and detection. Such techniques include anti-debugging, encryption,… Read More »