Search the Community
Showing results for tags 'malware'.
-
I am not sure if this is the right bored to be talking about this I am willing to code Trojans,Viruses,Bots and any other type of malware in exchange for bitcoins. It could do just about anything you want example: Backdoor a system, Destroy the entire computer, Delete files, Record video and audio, etc pm me if your interested
-
My brother got some ransomware on his phone. I would just encrypt and factory reset a couple of times. But I can't access anything on the phone. Any time I try to open up settings it just pops up this fake FBI thing. I need something like DBAN but for an android phone. The only other device I can see it being able to boot from is the micro sd card. But can this thing network boot. Is there a way to boot android any kind of recovery mode? I don't really phones all that good. Ok so I figured out how to boot into safe mode and factory reset the thing. But hey, are there some other nifty ways
- 7 replies
-
- reimage
- ransomeware
- (and 5 more)
-
Hi everyone!! Does anyone has any tips and advice on how to get started in this area? Where can I learn more? Thank you very much!!
-
Evening all, I am a Security Analyst with a number of years under my belt. I have worked for many organisations in quite a few different industries, namely Defence & Aerospace and Telecommunications. During my time working for a Defence & Aerospace company, I was heavily involved in APT investigations, APT group tracking and the field of threat intelligence (OSINT). I recently started a blog, Chimera Security and was wondering, what is the best way to get my brand out there and start generating traffic? I am already working on a few projects and will be posting write-ups of those ov
- 4 replies
-
- Security Analyst
- APT
- (and 4 more)
-
This 3 part article gives a comprehensive description of Windows commandline usage and how the myriad commands may be used to maximise productivity in malwarre and forensic sessions. Part 1 : http://resources.infosecinstitute.com/command-line-for-windows-malware-analysis-forensics-part-i/ Part 2 : http://resources.infosecinstitute.com/commandline-malware-and-forensics/ Part 3 : http://resources.infosecinstitute.com/cmd-exe-loops-part-iii/
-
- Windows CMD
- forensic
-
(and 2 more)
Tagged with: