THREATrack Blog

@THREATrack

Updated: 2020-12-20

  • 2020-02-21: Binary clustering with r2pipe, capstone and Gephi: “DnA GeNoMe mAlWaRe AtTrIbUtIoN EnGiNeS” demystified
  • 2019-10-17: Limits of Ghidra Patch Diffing: Response to Maddie Stone’s talk about diffing CVE-2019-3568
  • 2019-10-10: Custom Ghidra Version Tracking Correlator: Towards Usable Patch Diffing
  • 2019-10-02: Patch Diffing with Ghidra: Using Version Tracking to Diff a LibPNG Update
  • 2019-09-20: Ghidra FID generation: Automate .fidb generation with headless Ghidra
  • 2019-09-08: Improve account security with U2F: Current state of U2F for various online services
  • 2019-08-18: Quo DMARC .de?: Verbreitung des Emailfälschungsschutzes DMARC in Deutschland
  • 2019-08-14: Email spoofing telemetry with DMARC: Get reports of who spoofs your domain
  • 2019-08-02: A simple spamtrap setup: Buy a domain, VPS and run a script and you too run a spamtrap
  • 2019-07-30: Jumpstarting your malspam honeypot: Using an ex-email provider’s domain as a (mal-)spam collector
  • 2019-04-30: Ghidra Review: Featuring: Shadow Hammer (Stage 1: Setup.exe) Analysis, The Engineering in Reverse Engineering and Automation
  • 2019-04-12: gHIDEra: Hidding from the NSA: Incorrect handling of sectionAlignment leads to data hiding opportunities against Ghidra
  • 2019-04-02: Scoping the security boundaries of a low cost hardware password safe: Superficial security assessment of the “PasswordsFAST” hardware password safe
  • 2017-11-11: Inside a low budget consumer hardware espionage implant: Analysis of the S8 data line locator