MENU

Posts Tagged ‘obfuscation’

Most Recent
 
Read More
2018-03-28

Obfuscation and Detection Techniques

Attackers are constantly improving and therefore are looking for new attacks, using evasion techniques to maintain the effectiveness of old vectors in the ever-changing protective landscape. Many of these threat participants use the obfuscation framework for common scripting languages, such as JavaScript and PowerShell, to prevent signature-based detection of conventional offensive tradecraft written in these languages. Some hidden intruders have translated their tradecraft into languages ​​that do not support this additional visibility.

394
 
Read More
2017-12-11

Dissecting LLVM Obfuscator

Karim El-Faramawi described in detail the dissecting obfuscator LLVM in his blog, as well as any possible shortcomings in the implementation of obfuscative passages.

157
Latest Headlines
 
Read More
941
 
Read More
477
 
Read More
931

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
Android forensics
digital forensics software
windows forensics
forensic data recovery
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
Android forensic analysis with Autopsy

Get Help Now

Thank you for contacting us.
Your Digital Investigator will call you shortly.