Home
JT_Dunnski
Cancel

Log4Shell - What is it, How does it Work & How to Detect it

Introduction: In this write up I will be discussing what Log4J is, what CVEs are out there now, how the Log4Shell vulnerability works and how to detect the activity.  The goal of this write up is t...

Disabling Windows Defender for Your Malware Analysis Lab

Introduction: When it comes to malware analysis and reverse engineering, in most cases, you will want to have your AV and security tools disabled. The main reason for this is so your AV doesn’t acc...

Adding ScyllaHide Plugin to x32/64DBG

Introduction: Today I wanted to quickly detail how you can add the ScyllaHide plugin into your x32/64dbg tools. ScyllaHide is an open source plugin that can help to hide your debugger from common a...

Malware Analysis Series - Part 2, How to Isolate our Homelab with Network Segmentation

Introduction: In part one of this series, we established a solid foundation to begin our malware analysis journey. We successfully stood up two VMs; a Windows(FLARE) machine and a Linux(REMnux) m...

Malware Analysis Series - Part 1, Setting Up a Basic Malware Analysis Virtual Lab

Introduction: Since joining the Cyber Security and Intelligence community in 2016, I’ve always had a strong interest in malware analysis. The process of breaking something down, looking at its ind...