877.791.9571 |

About the Author:

Arvind is an Information Security Professional with 6 years of experience in system, network and Web application penetration testing. He is currently a security researcher at Infosec Institute. In addition, he freelances in information security and product development [Perl, Ruby on Rails], while spending a lot of time learning more about malware analysis and reverse engineering.
Trojan-Horse

Analyzing the German Trojan, Part 3: the Skype Component

Introduction

In the last two parts, available here and here, we looked at the dropper and one of its components (a small EXE file) in quite some detail. In this […]

Trojan-Horse

German Trojans 2

,

Introduction

In the last article, I discussed in quite some detail how exactly the dropper for Bundestrojaner worked. In my next article what I’d been planning to do was to […]

german-trojan

Malware Analysis – Follow along reversing the German government’s “Bundestrojaner”

Introduction

I’m reasonably sure that anyone reading this particular article has heard about viruses, worms, trojans and malware; as well as numerous antivirus products like Symantec, McAfee, AVG and many […]

trojan

Creating Backdoors Using SQL Injection

Introduction

If you’re reading this article than I’m reasonably sure that you have heard of a virus, otherwise refered to as a Trojan horse or worm, which can infect your […]

Rootkit Detector Features: Malicious System Threads and Debug Registers

,

Introduction:
In my last article, we’d discussed the most important ways in which a rootkit enters a system and subsequently masks its presence so it isn’t detected. We’d also looked […]

Rootkit Detection with Tuluka Kernel Inspector

Introduction

A rootkit is a piece of software that is written by someone, who at the very least, wants to spy on specific system calls made by an application, for […]

Blind SQL Injection 1.0 – Attack Anatomy

Introduction:

In this article we’ll discuss Blind SQL Injection and how the attack can be carried out. We’ll start off with the basics of SQL Injection, briefly discuss its types […]

HTTP Response Splitting Attack

,

Introduction:

In this paper we will discuss HTTP Response Splitting and how the attack can actually be carried out. When we’re clear about how it works, because it is an […]