-
Practical Malware Analysis: Lab 3-3
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-3 malware.
-
Practical Malware Analysis: Lab 3-2
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-2 malware.
-
Practical Malware Analysis: Lab 3-1
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 3-1 malware.
-
Kankun Smart Plug Network Decryption
In the first blog post about the Kankun smartplug, the Android application was decompiled and the AES-256 bit encryption key was found. In this blog post, the network traffic between the mobile app and smartphone will be captured, the network traffic will be decrypted utilizing a script from Payatu and the encryption key found previously, and the Kankun Smartplug will be controlled via the Kankun Controller Script from 0x00string
-
Practical Malware Analysis: Lab 1-4
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-4 malware.
-
Practical Malware Analysis: Lab 1-3
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-3 malware.
-
Practical Malware Analysis: Lab 1-2
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-2 malware.
-
Practical Malware Analysis: Lab 1-1
Walkthrough of the processes followed to analyze the Practical Malware Analysis Lab 1-1 malware.
-
Kankun Smart Plug Analysis
During the Offensive Internet Of Things course, the Kankun Smart Plug is analyzed in various ways including: using Jadx to decompile and analyze the mobile app, acquiring and analyzing the device's firmware, and a nalyzing the network traffic.
-
TP-Link TL-WR810N Firmware Analysis
For one of the projects for the Offensive Internet Of Things Exploitation final exam I decided to try to analyze the firmware for the TP-Link TL-WR810N

