β€βπ₯6π1π₯1
https://cocomelonc.github.io/malware/2024/12/29/malware-cryptography-38.html next one on my blog.
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
As an example, added simple analysis of standard on block cipher from #Kazakhstan
Of course, this post does not pretend to be a full-fledged academic research, but the concepts and source code can help many who are engaged in practice-oriented research and not just in theory.
I hope this post is useful for malware researchers, C/C++ programmers, spreads awareness to the blue teamers of this interesting encryption technique and analysis tricks, and adds a weapon to the red teamers arsenal.
twitter: https://x.com/cocomelonckz/status/1873639894872187096
#hacking #cybersec #cybersecurity #malware #malwaredev #cryptography #research #cryptanalysis #redteam #blueteam #purpleteam #cybercrime #math #science #python #clang #programming
cocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
ο·½
1β€5π2π₯1
https://cocomelonc.github.io/malware/2025/01/16/malware-cryptography-39.html next one on my blog.
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
This post is the result of my own research on using DES-like ciphers on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.
#cybersecurity #informationsecurity #cybersec #cybercrime #hacking #malware #cryptography #malwareanalysis #programming #redteam #blueteam #purpleteam #research #book
cocomelonc
Malware and cryptography 39 - encrypt/decrypt payload via DES-like cipher. Simple C example.
ο·½
1β€8π1π₯1π1
https://cocomelonc.github.io/malware/2025/01/19/malware-tricks-44.html next one in my blog.
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
Malware like BitRAT, RecordBreaker, and APTs like APT32: OceanLotus use GitHub for malicious actions in the wild.
#cybersecurity #malware #cybercrime #hacking #malwaredev #malwareanalysis #research #redteam #blueteam #purpleteam #programming #github #book
cocomelonc
Malware development trick 44: Stealing data via legit GitHub API. Simple C example.
ο·½
β€4π1π₯1
In the previous examples I created a simple Proof of Concept
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
βstealingβ simplest information from victimβs Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
of using legit connections via
Telegram Bot API
VirusTotal API and
Discord Bot API for
βstealingβ simplest information from victimβs Windows machine.
#malware #cybersecurity #cybercrime #telegram #virustotal #discord #hacking #research #apt
cocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
ο·½
β€5π1π1
https://cocomelonc.github.io/linux/2025/02/01/linux-hacking-4.html next post on my blog. This technique is often used in security research, particularly in side-channel attacks where attackers measure access times to infer sensitive data.
If youβre interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
If youβre interested in learning more about low-level performance analysis and side-channel attacks stay tuned for future posts!
#cybersecurity #malware #hacking #research #linux #programming #cpu #cybercrime #apt #redteam #blueteam #purpleteam #ethicalhacking #infosec #informationsecurity #malwaredev #malwareanalysis #cpp #clang
cocomelonc
Linux hacking part 4: Measuring cache hit and cache miss times in linux.
ο·½
β€5π1π₯1