Recent Articles

Malicious Document Investigation: XCEL Macro Analysis

Malicious Document Investigation: XCEL Macro Analysis

This Excel document contains malicious macros that are obfuscated to avoid detection. When opened and macros are enabled, it attempts to reach out to external resources hosted on malicious URLs and download and execute additional payloads. Source: ht...

Malware Analysis: njRAT.exe Report

Malware Analysis: njRAT.exe Report

In this exercise, I analysed a Remote Access Trojan binary, njRAT.exe, sourced from the Zoo malware repository on GitHub. Analysis revealed that the sample was originally compiled in 2013 as EnKSaR.HaCKeR.exe. The malware is designed to grant an atta...

Random Password Generator with Python

Random Password Generator with Python

The goal of this exercise is to write a code that generates a Random Password with Python. The function is named randomPassword, and it generates a random password that takes no parameters. The password criteria are as follows: The password will hav...

Security Investigation with Splunk

Security Investigation with Splunk

In this exercise, I investigated failed authentication attempts with Splunk to detect potential threat actors attempting to gain access to the environment. This exercise is divided into three parts: Detection, Validation, and Scoping. I found this re...

Understanding Threat Hunting

Understanding Threat Hunting

Understanding Threat Hunting Organisations use Security Information and Event Management (SIEM) software which comprises security monitoring and log management tools to detect suspicious activities on their network. Intrusion Detection System (IDS) a...

Malware Analysis with Security Onion

Malware Analysis with Security Onion

In this exercise, I investigate an incident wherein a user got compromised through a malicious email. My goal is to figure out how the computer got infected and document my findings. This malware exercise was obtained from malware-traffic-analysis....