Skip to content

{ Tag Archives } reverse engineering

Blackhole.BN exploit analysis and removal

Yesterday, a friend told me that a website we know had be infected by the blackhole exploit kit, and showed me a screen capture of his antivirus disallowing the access to the page. I immediately decided to open a virtual machine, and load the website to have a closer look. The paged didn’t looked suspicious […]

Also tagged , , ,

Basic Shellcode Analysis

Analyzing a shellcode is always instructive, it can give the penetration tester hints about what is used in it, or the penetration tester can learn about the techniques used, but he might also prevent himself to use destructive shellcodes. After a few searches on the Internet I found a pastebin page to illustrate my example. […]

Also tagged , , ,