Converting String, Hex and Fixnum Using Ruby

1.0 Introduction Software development in the security domains always involve converting from and to hex and binary format. For those new to certain languages, a high learning curve is involved and this translates to increasing the development cost. This article concentrates in using the ruby language to help new comers shorten the learning curve. To […]

Posted on 28/12/2010 by mhafiz in Development | Tagged ruby hex variable | Leave a comment

ProFTPD 1.3.3c Compromise:Trojan Source Code

On Sunday, the 28th of November 2010 around 20:00 UTC the main distribution server of the ProFTPD project was compromised.  The attackers most likely used an unpatched security issue in the FTP daemon to gain access to the server and used their privileges to replace the source files for ProFTPD 1.3.3c with a version which […]

Posted on 10/12/2010 by mhafiz in analysis | Tagged proftpd, trojan | Leave a comment

IDA Pro: IDC Script for Decrypting VB Obfuscated Malware

I was playing with a piece of malware with Jun Yee and we came across an obfuscated string in the VB code. The malware itself was written in Microsoft Visual Basic 6. It has a feature that allows the malware to overwrite itself after execution just to make it a bit stealthier. Additionally, the virus […]

Posted on 01/12/2010 by Kamil Alta in analysis, Development, malware | Tagged analysis, idapro, script | Leave a comment

Pages

  • About

Tweets by @mycert

Archives

  • May 2025
  • August 2023
  • September 2022
  • January 2019
  • November 2018
  • October 2018
  • January 2018
  • December 2015
  • November 2015
  • October 2015
  • August 2014
  • May 2014
  • April 2014
  • February 2014
  • April 2011
  • January 2011
  • December 2010
  • November 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • July 2009
  • March 2009

Categories

  • 0-day
  • analysis
    • Phishing
  • Android
  • Development
    • Database
    • MySQL
  • dionaea
  • Honeypot
  • LebahNET
    • Statistic
  • Log
  • malware
    • PDF
  • Malwr
  • Scripting
  • Uncategorized
  • Web security
    • php

Recent Comments

  • fatah on MyCERT PCAP Analyzer
  • saurabh on MyCERT PCAP Analyzer
  • eis on LebahNET Statistic – September 2015
  • Fikri Fadzil on Dionaea: Malwr Module
  • ahmad on Forensic Challenge 2010/6 – Analyzing Malicious Portable Destructive Files is now live
Copyright © Blog Honeynet CyberSecurity Malaysia 2025. WordPress theme by Ryan Hellyer.