Author: admin

  • Antique HackTheBox Walkthrough

    Summary Antique is Linux machine and is considered an easy box by the hack the box. On this box, we will begin with a basic port scan and move laterally based on the findings. Then we will enumerate telnet service and hunt vulnerabilities present in a particular version. Laterally, we will exploit password disclosure vulnerability…

  • Burp suite: Target

    Introduction In this tab, we can find several useful options that are invaluable in any bugbounty hunters toolbelt in my opinion. I’m not going to bore you with the very basics, i assume you already know those. Instead i am going to show you all the cool tricks we can with this section of burp.…

  • Burp Suite: Dashboard

    Introduction Burp suite has many useful features in store for us, even right after starting up. As a user of the community version of burp, your options here will be somewhat limited but still useful in debugging our project. We will start with one of the few free options available to us. Event log This…

  • Burp Suite: Do i need the profesional edition?

    Introduction I often get asked this question and i can be very short about this, no. You don’t need burp pro. That being said, it does have some very big advantages that will make life a lot easier on you. So while you don’t need burp suite, you don’t need it in a sense that…

  • XML eXternal Entities

    Introduction XXE is one of my favourite attack types because it’s usually hidden below a surface level concealment. We all know that almost nobody uses XML files anymore these days as JSON has taken over and even YAML. Yet the fact XXE appears in the OWASP top 10 of 2017 does say something about this…

  • Windows Architecture

    Introduction This module explains the Windows architecture and what happens under the hood of Windows processes and applications. Windows Architecture A processor inside a machine running the Windows operating system can operate under two different modes: User Mode and Kernel Mode. Applications run in user mode, and operating system components run in kernel mode. When…

  • Coding Basics

    Introduction As previously mentioned, this course requires a fundamental understanding of C as a prerequisite. With that being said, there are a few concepts that will be mentioned due to their importance throughout this course. Structures Structures or Structs are user-defined data types that allow the programmer to group related data items of different data…

  • Required Tools for malware development

    Required Tools Introduction Before beginning the malware development journey, it is necessary to prepare the development workspace by installing malware development and reverse engineering tools. These tools will aid one in the development and analysis of the malware and will be used throughout the modules. Reverse Engineering Tools Several of the tools mentioned focus more…

  • Introduction To Malware Development

    Module 2 – Introduction To Malware Development Introduction To Malware Development What is Malware? Malware is a type of software specifically designed to perform malicious actions such as gaining unauthorized access to a machine or stealing sensitive data from a machine. The term “malware” is often associated with illegal or criminal conduct but it can…

  • Introduction to Malware

    Welcome Module Introduction Welcome to MalDev Academy! This is an introductory module to get you familiar with the layout of the modules and enable you to maximize the learning experience. Prerequisites Although MalDev Academy assumes the user has no malware development background, it does not thoroughly teach the basics of programming. Since the course mostly…