Skip to content

Nikhil Hegde

Vestigium

  • Blog
    • Technology
      • Reverse Engineering
        • Malware Analysis
          • Malware Analysis – Bandios – Part 2
          • Malware Analysis – Bandios – Part 1
          • Malware Analysis – TrickBot – Part 2
          • Malware Analysis – TrickBot – Part 1
          • Malware Analysis – Gozi/Ursnif Downloader
          • Malware Analysis – WannaCry
          • Malware Analysis – NanoCore + MITRE ATT&CK Mapping
          • Android Malware Analysis – BTCTurk Pro Beta
          • Android Malware Analysis – DroidDream
        • Firmware Extraction using BusPirate and Emulation using QEMU
        • String Deobfuscation using SMT Solver
        • JavaScript String Deobfuscation
      • Threat Detection / Intel
        • PCAP Analysis
          • PCAP Analysis – 4
          • PCAP Analysis – 3
          • PCAP Analysis – 2
          • PCAP Analysis – 1
        • Clustering Malware based on Printable Strings and Dynamic API Calls
        • Honeypot, Malware and Splunk
        • Binary Similarity Measure using ssdeep
        • Learning Splunk Rules by Analyzing iptables Firewall Logs
      • Forensics
        • Analyzing Memory Dumps – R2D2 Malware
      • Exploit Techniques
        • Format String Exploit
        • Integer Overflow Vulnerability
        • Return-Oriented Programming – ROP Chaining
        • Return-to-libc Exploit
        • Using Environment Variables in an Exploit
      • Pentesting
        • Pentesting – VulnHub: DC-1
        • Pentesting – VulnHub: DC-2
        • Pentesting – VulnHub: DC-4
      • Security Research
        • Using Steganography to Distribute Malware?
      • Blockchain
        • Lottery on the Ethereum Blockchain
        • Bitcoin Blockchain as a Graph in Neo4j
    • Astronomy
      • Celestial Coordinate Systems
  • LinkedIn
  • Twitter
  • GitHub

Tag: malware

January 20, 2020 Network Security

PCAP Analysis – 1

As my winter vacations come to an end, I decided to start warming up my brain in preparation for the

Continue reading
MalwareAnalysisFeatureImage
December 23, 2019 Malware Analysis

Malware Analysis – Bandios – Part 2

In the previous article, I analyzed the Bandios dropper. In this article, I’m going to analyze two of the dropped

Continue reading
MalwareAnalysisFeatureImage
December 10, 2019 Malware Analysis

Malware Analysis – Bandios – Part 1

For a long time, I have wanted to analyze a rootkit. Especially, after watching the first episode of Mr. Robot

Continue reading
November 11, 2019 Threat Detection / Intelligence

Honeypot, Malware and Splunk

Many articles in my blog are dedicated to malware analysis. All of the articles involve downloading the malware from malware

Continue reading

Posts navigation

«Previous Posts 1 2 3 4 5 Next Posts»
WordPress Theme: Maxwell by ThemeZee.