Aug 23, 2016

All About Crypter


What is a Crypter?
A Crypter is a software encryption which encrypts your viruses, keyloggers, RATS or any other hacking tool from becoming detected by Antiviruses. A Crypter makes Antiviruses pretty much useless. This is because when encrypting any malware tool, the Crypter uses various encryption methods to bypass Antiviruses from analysing the output.

What does Scantime and Runtime mean?
Scantime is a method used to bypass Antiviruses from analysing your encrypted files, while real time protection is enabled.Runtime is used to bypass Antiviruses when the encrypted file is executed. The Runtime method then decrypts the encryption in the memory. Generally all Crypters use the Scantime and Runtime method.

What is the Stub?
The Stub is packed with junk or undetected code to help your encrypted file stay fully undetected for some time or maybe even weeks. When the stub eventually becomes detected, the file becomes detected by antiviruses when executed on the machine.

Read More......



Para maniak underground di Indonesia mungkin pernah ada yang mendengar tentang istilah Anti-Security Movement, atau pr0j3ct m4yh3m, dsb. Sebagian tahu mengenai masalah ini, namun sebagian lain belum tahu kejelasan nya dan penasaran tentang ‘apa itu project mayhem dan anti-sec movement?’. Berikut ini akan diberikan penjelasan singkat dari stryfe mengenai hal tersebut, penjelasan (they called it, speech) tersebut di record oleh salah seorang anggota underground juga pada site nya, versi asli bisa ditemukan disini. Dan sebagai informasi, stryfe merupakan salah satu anggota kelompok underground pendukung pr0j3ct m4yh3m.

Read More......


Viper is a binary analysis and management framework. Its fundamental objective is to provide a solution to easily organize your collection of malware and exploit samples as well as your collection of scripts you created or found over the time to facilitate your daily research. Think of it as a Metasploit for malware researchers: it provides a terminal interface that you can use to store, search and analyze arbitraty files with and a framework to easily create plugins of any sort.

Viper is written in Python and it requires Python 2.7 to function properly. In this documentation we will use Debian GNU/Linux based distributions, such as Ubuntu, as a reference platform. The following installation instructions should apply similarly to other distributions and possibly to Mac OS X as well, although it has not been properly tested

Read More......

Project Artillery is an open source project aimed at the detection of early warning indicators and attacks. The concept is that Artillery will spawn multiple ports on a system giving the attacker the idea that multiple ports are exposed. Additionally, Artillery actively monitors the filesystem for changes, brute force attacks, and other indicators of compromise. Artillery is a full suite for protection against attack on Linux and Windows based devices. It can be used as an early warning indicator of attackers on your network. Additionally, Artillery integrates into threat intelligence feeds which can notify when a previously seen attacker IP address has been identified. Artillery supports multiple configuration types, different versions of Linux, and can be deployed across multiple systems and events sent centrally.

Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run ./setup.py and hit yes, this will install Artillery in /var/artillery and edit your /etc/init.d/rc.local to start artillery on boot up.

Read More......
Jan 21, 2014

Malware, apakah itu?


Secara definitif malware adalah kode jahat, maka ia mencakup worm, trojan, virus, spyware / adware, rootkit, bots, exploit, backdoor, dll.
Kali ini saya akan bahas yang paling umum saja; virus, worm, spyware, trojan

Read More......

remnux by vyc0d

Setelah sekian lama gk posting, akhirnya sempet jg nulis di blog :p
Kali ini gw sekedar share OS khusus dibuat untuk malware reverse-engineering, recomended dari ane nih.wekeke
REMnux yang distribusikan khusus pada Linux telah dirilis sampai v4. Sistem operasi ini berfungsi untuk melakukan malware reverse-engineering, termasuk alat untuk melakukan analisis forensik pada memori serta analisis file PDF yang berpotensi berbahaya.
REMnux pertama kali dirilis tahun 2011 dan merupakan karya Lenny Zeltser, seorang ahli malware dan instruktur SANS. Remnux dirancang untuk menciptakan suatu lingkungan mandiri yang menganalisis dan melakukan malware reverse-engineering, aplikasi berbahaya lainnya dan website. File ini dapat di download secara terpisah dan di jalankan melalui CD atau virtual drive.

Read More......

OWASP (Open Web Application Security Project)
The Ten Most Critical Web Application Security Risks

Read More......


What is Orbot?
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.

Read More......


Alex Gibney is a titan of documentary making. Here's 10 reasons to watch his latest, the excellent Wikileaks: We Steal Secrets and then hit the back catalogue.

1. Gibney does documentary as blockbuster. You’ll not even realise you’re learning.
Gibney takes big, brawny subjects and adds brains. He’s done financial corruption in Enron, U.S. torture in Taxi to the Dark Side and now Wikileaks founder Julian Assange in We Steal Secrets.

Read More......