nahidul kibria

640 Flips | 7 Magazines | 108 Followers | @nahidupa | Keep up with nahidul kibria on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “nahidul kibria”

Lateral Movement using Excel.Application and DCOM

Back in January, I put out two blog posts on using DCOM for lateral movement; one using MMC20.Application and the other outlining two other DCOM …

AWS Security Primer

I was preparing some AWS Security related training. Soon, I realized that this topic is too huge to fit into my brain. So I structured my thoughts in …

Cloud Computing

How to Scrape Data From Facebook Page Posts for Statistical Analysis

One of the first data scrapers I wrote for the purpose of statistical analysis was a Facebook Graph API scraper, in order to determine which words …

Social Media

binsnitch.py

README.md<p>binsnitch can be used to detect silent unwanted changes to files on your system. It will scan a given directory recursively for files and …

Operation Brightroar: Cybercriminals are spreading malware in large APT attack in Bangladesh

A couple of days ago, we noticed that a few somewhat suspicious text messages, claiming to give the user "free internet" and other things, was being …

How I found a $5,000 Google Maps XSS (by fiddling with Protobuf)

A few months ago, I used Google Maps. Or maybe Google Street View, I love Street View, it’s like a retrofuturistic way to teleport. Routinely, I …

47 binary posters (2017-08-23)

Posters

9 Interesting Ways to Watch Cyberattack in Real-time Worldwide

It’s interesting to watch who is initiating cyber-attack whom globally live. Thousands of website gets hacked every day due to vulnerable files, …

Cybersecurity

New Attack, Old Tricks

New Attack, Old Tricks<p>› analyzing a malicious document with a mac-specific payload<p>2/6/2017<p>This blog post is the result of a 'collaborative' …

Cybersecurity

KB Parallels: Can VMWare deployment package with .ova extension be converted for Parallels Desktop?

Please make sure you deleted previous tools from your virtual machine (old Parallels Tools or VMware tools, etc.)<p>Fully Shut down your virtual machine …

Volatility

Description<p>The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the …

Forensics

Finding Advanced Malware Using Volatility

Hakin9 Magazine now has a course on Volatility, you should check it out ->FINDING ADVANCED MALWARE USING VOLATILITY<b>by Monnappa Ka</b><b>What you should …

Forensics

KOVTER RANSOMWARE – THE EVOLUTION: From Police Scareware to Click Frauds and then to Ransomware

In terms of cyber security research, the Kovter malware family is very interesting. A wide-spread malware found in different parts of the cyber …

Cybersecurity

Microsoft DigitalRiver Mirror

Microsoft

Poweliks File-less Malware Keeps Evolving - Update 1

Poweliks (actually we should say Kovter) is a well-known and studied click-fraud malware that made its first appearance in early August 2014, it …

Clustered RabbitMQ on Kubernetes

The post Clustered RabbitMQ on Kubernetes appeared first on Mirantis | Pure Play Open Cloud. There are a lot of possible approaches to setting up …

DevOps

memory analysis Archives

I recently had the opportunity to attend the Volatility Windows Malware and Memory Forensics Training. Prior to the training, I used memory forensics …

Thanks for the Memories: Identifying Malware from a Memory Capture

We've all seen attackers try and disguise their running malware as something legitimate. They might use a file name of a legitimate Windows file or …

Facebook's ImageTragick Remote Code Execution

I want to believe that all of you know about ImageMagick and its Tragick. This issue was found in the end of the April, 2016 and due to many …

Untangling Kovter’s persistence methods

Kovter is a click-fraud malware famous from the unconventional tricks used for persistence. It hides malicious modules in PowerShell scripts as well …

Cybersecurity

How to display dates and times in clients timezone

Introduction<p>Dates and times are very important in any online application. If you are making an online transaction it is important to record the date …

How To Do Microservices with Node.js

Matteo Collina<p>Matteo has nine years’ experience in the software industry and is a well-known figure in the global Node.js, Internet of Things and …

SCC Guide

SCC is a collection of services which allow you to easily deploy and scale SocketCluster to any number of machines. SCC is designed to scale linearly …

DevOps

Moving a Node.js app from PaaS to Kubernetes Tutorial

<b>From this Kubernetes tutorial, you can learn how to move a Node.js app from a PaaS provider while achieving lower response times, improving security</b> …

DevOps