Skip to content

Nikhil Hegde

Vestigium

  • Blog
    • Technology
      • Reverse Engineering
        • Malware Analysis
          • Malware Analysis – Bandios – Part 2
          • Malware Analysis – Bandios – Part 1
          • Malware Analysis – TrickBot – Part 2
          • Malware Analysis – TrickBot – Part 1
          • Malware Analysis – Gozi/Ursnif Downloader
          • Malware Analysis – WannaCry
          • Malware Analysis – NanoCore + MITRE ATT&CK Mapping
          • Android Malware Analysis – BTCTurk Pro Beta
          • Android Malware Analysis – DroidDream
        • Firmware Extraction using BusPirate and Emulation using QEMU
        • String Deobfuscation using SMT Solver
        • JavaScript String Deobfuscation
      • Threat Detection / Intel
        • PCAP Analysis
          • PCAP Analysis – 4
          • PCAP Analysis – 3
          • PCAP Analysis – 2
          • PCAP Analysis – 1
        • Clustering Malware based on Printable Strings and Dynamic API Calls
        • Honeypot, Malware and Splunk
        • Binary Similarity Measure using ssdeep
        • Learning Splunk Rules by Analyzing iptables Firewall Logs
      • Forensics
        • Analyzing Memory Dumps – R2D2 Malware
      • Exploit Techniques
        • Format String Exploit
        • Integer Overflow Vulnerability
        • Return-Oriented Programming – ROP Chaining
        • Return-to-libc Exploit
        • Using Environment Variables in an Exploit
      • Pentesting
        • Pentesting – VulnHub: DC-1
        • Pentesting – VulnHub: DC-2
        • Pentesting – VulnHub: DC-4
      • Security Research
        • Using Steganography to Distribute Malware?
      • Blockchain
        • Lottery on the Ethereum Blockchain
        • Bitcoin Blockchain as a Graph in Neo4j
    • Astronomy
      • Celestial Coordinate Systems
  • LinkedIn
  • Twitter
  • GitHub

Category: Reverse Engineering

MalwareAnalysisFeatureImage
December 23, 2019 Malware Analysis

Malware Analysis – Bandios – Part 2

In the previous article, I analyzed the Bandios dropper. In this article, I’m going to analyze two of the dropped

Continue reading
December 19, 2019 Reverse Engineering

Firmware Extraction using BusPirate and Emulation using QEMU

Meddling with hardware and electronic devices seems like a very “hacker” thing to do. In that spirit, I felt it

Continue reading
MalwareAnalysisFeatureImage
December 10, 2019 Malware Analysis

Malware Analysis – Bandios – Part 1

For a long time, I have wanted to analyze a rootkit. Especially, after watching the first episode of Mr. Robot

Continue reading
MalwareAnalysisFeatureImage
November 6, 2019 Malware Analysis

Android Malware Analysis – BTCTurk Pro Beta

I came across BTCTurk Pro Beta malware while reading a blog and my good friend, Libra provided its sample. Unlike

Continue reading

Posts navigation

1 2 3 Next Posts»
WordPress Theme: Maxwell by ThemeZee.