Monday, September 28, 2015

Examining Linux Process Memory, Part 1

Hey everyone.  This is the first part in a two part series where we will briefly examine reading process memory in Linux.  I was inspired by a tool that reads credit card track data out of process memory in Windows.  After I saw that tool, I wondered to myself how hard it would be to do something similar in Linux, but with Python.  In this part, we will talk about how we can access memory in Linux.  In the second part, we will look at a script that does similar work to the Powershell script linked above.

Monday, September 21, 2015

A Little Fun with Scapy: Writing a Port Scan Detector

Hey everyone! This week, I thought it would be fun to play around with scapy.  Scapy allows you to manipulate packets to do basic things like port scanning or host discovery, but also things that might seem strange at first, like send malformed packets.  You might want to do that if you were trying to test an application for vulnerabilities by trying to see how it would react to a corrupted packet or stream.  It is a really cool tool, and today, I am going to use it to implement a port scan detector.

Monday, September 14, 2015

Malware's Use of Legitimate Software

Hey everyone.  I was browsing the Internet when I stumbled across a couple of links that got me thinking.  In this post, we will discuss malware that leverages "legitimate" software to do its dirty work.

Monday, September 7, 2015

My Thoughts On "The Basic Principles Of Security and Why They Matter"

Hey everyone - I stumbled across this article entitled "The Basic Principles Of Security and Why They Matter."  I think it is a good read, and I wanted to share my thoughts on some of the topics raised in it.  So without further ado...