Brett Lischalk
  • Practical Malware Analysis: Lab 3-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-3 malware.

    June 27, 2018 - 2 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-2 malware.

    December 31, 2017 - 5 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 3-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-1 malware.

    September 20, 2017 - 5 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Network Decryption

    In the first blog post about the Kankun smartplug, the Android application was decompiled and the AES-256 bit encryption key was found. In this blog post, the network traffic between the mobile app and smartphone will be captured, the network traffic will be decrypted utilizing a script from Payatu and the encryption key found previously, and the Kankun Smartplug will be controlled via the Kankun Controller Script from 0x00string

    September 15, 2017 - 9 minute read - analysis kankun decryption
  • Practical Malware Analysis: Lab 1-4

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-4 malware.

    August 28, 2017 - 4 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-3

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-3 malware.

    August 27, 2017 - 3 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-2

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-2 malware.

    August 24, 2017 - 4 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Practical Malware Analysis: Lab 1-1

    Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-1 malware.

    August 24, 2017 - 4 minute read - malware analysis practical-malware-analysis reverse-engineering
  • Kankun Smart Plug Analysis

    During the Offensive Internet Of Things course, the Kankun Smart Plug is analyzed in various ways including: using Jadx to decompile and analyze the mobile app, acquiring and analyzing the device's firmware, and a nalyzing the network traffic.

    August 14, 2017 - 6 minute read - firmware analysis kankun android
  • TP-Link TL-WR810N Firmware Analysis

    For one of the projects for the Offensive Internet Of Things Exploitation final exam I decided to try to analyze the firmware for the TP-Link TL-WR810N

    July 5, 2017 - 7 minute read - firmware analysis tp-link
Tweets by @blischalk

Site content by: Brett Lischalk.