Latest Articles

Rootkit concealment part 2

Thursday, 04 June 2015 00:00 Written by
Rootkit concealment part 2 In my previous article: Rootkit concealment part 1 I talked about the methods to hide the registry keys and directories. In this article methods to hide the drivers and processes are discussed. In both cases the logic behind the concept is the same although kernel data…

Introduction to the rootkit development

Tuesday, 02 June 2015 00:00 Written by
Introduction to the rootkit development A rootkit is an application with high privileges that is able to manipulate the execution of other processes, intercept network traffic or a keystroke, conceal itself or etc. Some of the rootkit features are inherent capabilities of drivers. Thus we write a driver in this…

keylogger source code

Monday, 01 June 2015 00:00 Written by
Keylogger Source Code Spyware is a type of malware that aims to record every move you make. This means a spyware records your network traffics, files and things you type with your keyboard. Spyware source code mostly consists of driver related source codes. The rootkit source code should identify itself…

Kernel hooks | Kernel Hacking

Saturday, 30 May 2015 00:00 Written by
Kernel hooks | Kernel Hacking Modifying an OS’s API functionality is possible through kernel hooks. By invoking a kernel hook many examples of rootkits disrupt monitoring mechanism of OS and conceal your rootkit. System calls are registered in the operating system service table so when an application calls an API,…

Popular Articles

Windows registry forensics While forensic investigations, windows registry values are…
Security Terms In this article I am going to explain…
When Must HTTPS and SSL be used? Communicating over Secure…
Password Salt A lot of developers when ran to “salt”…

api hooking | examples of rootkits | code injection | User mode hooking

Thursday, 28 May 2015 00:00 Written by
Usage of API hooking for code injection One method of code injection is using API hooking! In this approach a kernel api like ZwMapViewOfSection (which is responsible of loading dlls) is first hooked and then in the hooking version we can easily hook Dynamic Link Library functions. By hooking ZwMapViewOfSection …

python hacking scripts | hacking with python

Wednesday, 13 May 2015 00:00 Written by
Python Hacking scripts | Hacking with python Both professional penetration testers and hackers need to learn hacking with python. Years ago hackers used to use Linux-Shell scripts a lot. A couple of years later Perl and PHP were the popular scripting language for hacking. Now Python is the leading scripting…

Windows registry forensics | Windows registry analysis

Wednesday, 13 May 2015 00:00 Written by
Windows registry forensics While forensic investigations, windows registry values are treasures. Although registry values can be accessed both through “regedit” UI and through “reg query” command, the power of a script to query and perform Windows registry forensic in code is much more. Python provides access to Windows registry through…

Remote hacking with metasploit

Sunday, 10 May 2015 00:00 Written by
Remote hacking with metasploit For those new to security and hacking the power of an attack with metasploit is surprising. Most of the times beginners find hacking the most interesting hobby! Well, the “real hacking”, which is footprinting, exploit development and attack design, needs a lot of knowledge, experience and…
Advanced Programming Concepts
News Letter

Subscribe our Email News Letter to get Instant Update at anytime