Windows Shellcoding x86 – Calling Functions in Kernel32.dll – Part 2

In the previous part, we found the address of Kernel32.dll dynamically by walking through the LDR struct. In this part, we will be focusing on finding the address of the … Continue reading “Windows Shellcoding x86 – Calling Functions in Kernel32.dll – Part 2”

Ground Zero: Part 3-3 – Reverse Engineering – Bypassing Breakpoint Detection – ARM64

A very common difficulty often faced by fellow reverse engineers is defeating anti-debugging measures. While it is important to many proprietary vendors to make their code as difficult to debug … Continue reading “Ground Zero: Part 3-3 – Reverse Engineering – Bypassing Breakpoint Detection – ARM64”

Active Directory Penetration Dojo – AD Environment Enumeration -1

Hi everyone, we’ve discussed basics of Active Directory and different servers in AD in previous blog posts of this series. If you’ve not yet read that, please find that here … Continue reading “Active Directory Penetration Dojo – AD Environment Enumeration -1”

Introduction to Windows Application Debugging – Part 1

Hi Friends, I am starting with this new series on Windows Application Debugging. With this blog series we will be looking into What is Debugging? Importance of debugging Tools of … Continue reading “Introduction to Windows Application Debugging – Part 1”

Malware on Steroids Part 4: Defender and Symantec Endpoint Protection Evasion

So, this blog is just going to be a rant about the comments on the twitter that I was facing for Windows Defender and Symantec Endpoint Protection Evasion. You can … Continue reading “Malware on Steroids Part 4: Defender and Symantec Endpoint Protection Evasion”

Active Directory Penetration Dojo- Creation of Forest Trust: Part 3

Hi everyone, Welcome to the third part of the setup series on Pentesting lab in AD environment. I apologize for the delay. Reason being I was busy in few family … Continue reading “Active Directory Penetration Dojo- Creation of Forest Trust: Part 3”