Skip to content

Nikhil Hegde

Vestigium

  • Blog
    • Technology
      • Reverse Engineering
        • Malware Analysis
          • Malware Analysis – Bandios – Part 2
          • Malware Analysis – Bandios – Part 1
          • Malware Analysis – TrickBot – Part 2
          • Malware Analysis – TrickBot – Part 1
          • Malware Analysis – Gozi/Ursnif Downloader
          • Malware Analysis – WannaCry
          • Malware Analysis – NanoCore + MITRE ATT&CK Mapping
          • Android Malware Analysis – BTCTurk Pro Beta
          • Android Malware Analysis – DroidDream
        • Firmware Extraction using BusPirate and Emulation using QEMU
        • String Deobfuscation using SMT Solver
        • JavaScript String Deobfuscation
      • Threat Detection / Intel
        • PCAP Analysis
          • PCAP Analysis – 4
          • PCAP Analysis – 3
          • PCAP Analysis – 2
          • PCAP Analysis – 1
        • Clustering Malware based on Printable Strings and Dynamic API Calls
        • Honeypot, Malware and Splunk
        • Binary Similarity Measure using ssdeep
        • Learning Splunk Rules by Analyzing iptables Firewall Logs
      • Forensics
        • Analyzing Memory Dumps – R2D2 Malware
      • Exploit Techniques
        • Format String Exploit
        • Integer Overflow Vulnerability
        • Return-Oriented Programming – ROP Chaining
        • Return-to-libc Exploit
        • Using Environment Variables in an Exploit
      • Pentesting
        • Pentesting – VulnHub: DC-1
        • Pentesting – VulnHub: DC-2
        • Pentesting – VulnHub: DC-4
      • Security Research
        • Using Steganography to Distribute Malware?
      • Blockchain
        • Lottery on the Ethereum Blockchain
        • Bitcoin Blockchain as a Graph in Neo4j
    • Astronomy
      • Celestial Coordinate Systems
  • LinkedIn
  • Twitter
  • GitHub

Author: Nikhil Hegde

June 25, 2020 Events

HackFest iHack 2020 MalwareTheFlag Write-up

HackFest conducted the iHack CTF on June 20th and 21st. iHack was targeted towards beginners who were looking to get

Continue reading
May 29, 2020 Astronomy

Celestial Coordinate Systems

Celestial coordinates are used to locate celestial bodies on the celestial sphere as seen from an observer on Earth. They

Continue reading
April 2, 2020 Threat Detection / Intelligence

Clustering Malware based on Printable Strings and Dynamic API Calls

In my experience of analyzing malware, the high-level process has always been straightforward. Examine static attributes, run it in a

Continue reading
January 21, 2020 Network Security

PCAP Analysis – 4

As my winter vacations come to an end, I decided to start warming up my brain in preparation for the

Continue reading

Posts navigation

1 2 3 … 9 Next Posts»
WordPress Theme: Maxwell by ThemeZee.