2. DDEã¨ã¯ï¼ â¢âDynamic Data Exchangeâ â¢1987å¹´ããããIPC⼿æ³ã®ï¼ã¤ (Win 2.0+ãOS/2) â¢ä¾ï¼3rdãã¼ãã£ã½ããã.xlsãã¼ã¿ã«ã¢ã¯ã»ã¹ â¢OLEãDDEã«åã£ã¦ä»£ãã â¢äºææ§ã®ããã«æ®ããã¦ããï¼T_T) â¢ã¿ã¼ã²ããâMS Ofï¬ceããã¥ã¡ã³ãããã®ä»ï¼ï¼ Word, Excel, Powerpoint, Access, Outlook, OneNote 4. Macroä¸è¦ã®Ofï¬ceæ»æ â¢2016/05/20 Sensepost : DDEçµç±ã§.xlsããã³ãã³ãå®â¾ https://sensepost.com/blog/2016/powershell-c-sharp-and-dde-the-power-within/ â¢2017/10/09 Sensepost : DDEçµç±ã§.docããã³ãã³ãå®â¾ https:/
This cheat sheet outlines tips and tools for analyzing malicious documents, such as Microsoft Office, RTF, and PDF files. To print it, use the one-page PDF version; you can also edit the Word version to customize it for you own needs. General Approach to Document AnalysisExamine the document for anomalies, such as risky tags, scripts, and embedded artifacts.Locate embedded code, such as shellcode,
In this post we will set up a virtual lab for malware analysis. Weâll create an isolated virtual network separated from the host OS and from the Internet, in which weâll setup two victim virtual machines (Ubuntu and Windows 7) as well as an analysis server to mimic common Internet services like HTTP or DNS. Then, weâll be able to log and analyze the network communications of any Linux or Windows m
âãã«ã¦ã§ã¢ãåãã㦠èªä½ C2 ãµã¼ãã¨ããã¨ãããã¦ããå³ã詳ããã¯ãã¼ã¸ä¸é¨ã«ã¦è§£èª¬ ãã ã¼ã¨ã§ãã å»å¹´ãããã«ããµã¦ã¸ã¢ã©ãã¢ã®éèæ©é¢ãçã£ãæ¨çåæ»æããã£ãã®ã§ããããã®æ»æã«DNS ãã³ããªã³ã°ãç¨ãã¦æ å ±ãå¤é¨ã«éä¿¡ãããã«ã¦ã§ã¢ãHelminthãã使ããã¾ããã 詳細ã¬ãã¼ã㯠Palo Alto Networks ã®è å¨å¯¾çãã¼ã Unit42 ãåºãã¦ããã¦ãã¾ãã OilRigæ»ææ´»å: ãµã¦ã¸ã¢ã©ãã¢ã®çµç¹ã¸ã®æ»æã§Helminthããã¯ãã¢ãé ä¿¡ - Palo Alto Networks ã¡ããã©æ¤ä½ãåºåã£ã¦ããã®ã§ã Helminth ã®è§£æãè¡ããC2ãµã¼ã(C&Cãµã¼ã)ãä½æãã¦ã¿ã¾ããã ãã®è¨äºã§ã¯ã解æã®éç¨ã§çºè¦ããä»æ§ã¨ããã«ã¦ã§ã¢ã«é¦´æã¿ããªãæ¹ã®ããã®DNSãã³ããªã³ã°ã®ä»çµã¿ã¨æ¦è¦ãè¨è¼ãã¦ãã¾ãã DNSãã³ããªã³ã°ã®ä»çµã¿
05.12.2013 Slides about an in depth analysis of CVE-2013-3906 exploiting a TIFF bug inside a Microsoft Office Winword file. This bug was exploited in a targeted attack in November 2013. masTIFF - An in depth analysis of CVE-2013-3906.pptx 25.11.2013 A new version of Officemalscanner/RTFScan has been released. This update includes a generic decryption loop detection, enhanced shellcode patterns and
This is the homepage of Michael Ligh. I am a reverse engineer who specializes in vulnerability research, malware cryptography, and memory forensics. I'm co-founder and CTO of Volexity, a security firm based out of the Washington, D.C. area that specializes in assisting organizations with threat intelligence, incident response, forensics, and trusted security advisory. I'm also a core developer of
Here is a set of free YouTube videos showing how to use my tools: Malicious PDF Analysis Workshop. pdf-parser.py This tool will parse a PDF document to identify the fundamental elements used in the analyzed file. It will not render a PDF document. The code of the parser is quick-and-dirty, Iâm not recommending this as text book case for PDF parsers, but it gets the job done. You can see the parser
Unix (general) Rosetta Stone for Unix Windows Debugging Tools for Windows 6.12.2.633 Forcing a System Crash from the Keyboard WinDbg Quick Download Links, Symbols, etc. SystemDump Application Verifier IDA (freeware) StressPrinters Dependency Walker Kernel Memory Space Analyzer MS Debug Diagnostic Tool InstantDump (JIT Process Dumper) UDmp2Txt (processing hundreds of user dumps) TestDefaultDebugger
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}