877.791.9571 |

About the Author:

c0d3inj3cT is an Information Security Professional and has a strong interest in various areas of Information Security ranging from Reverse Engineering, Cryptography, Malware Analysis, latest online threats to Web Application Security, Password Security. His other interests include working in GPGPU related tasks like Cryptographic Hashing Algorithm Cracking and Crypto Currencies.
MalwarePacker07172013

Deep Dive into a Custom Malware Packer

Introduction

In this article we will look in depth at a Custom Packer used by a Malware that was recently found in the wild. This packer is interesting for several […]

USB-malware06142013

How USB Malware Works

Introduction

In this article we will look at malware that propagate to other machines using USB removable devices. Unlike most malware which make use of vulnerable Network Services to spread […]

DataExfiltration06072013

Data Exfiltration Techniques

Introduction

In this article we will see how malware encode or encrypt data that’s exfiltrated to the Command and Control Server from infected machines. This is often done using a […]

Data-Exfiltration-feature

Data Exfiltration Techniques

Introduction

In this article we will see how malware encode or encrypt data that’s exfiltrated to the Command and Control Server from infected machines. This is often done using a […]

VB-virus-feature

Anatomy of a VB Virus

Introduction
In this article, we will look in depth at a virus written in Visual Basic. We look at various techniques used by this virus to deter the process of […]

Risks on a Shared Hosting Server

Risks of Using a Shared Hosting Server

PREFACE

In this article, I would like to present the risks associated with hosting your site on a shared hosting server. I often correlate it with the analogy, “a chain […]