Open in app

Sign In

Write

Sign In

Md. Mahim Bin Firoj
Md. Mahim Bin Firoj

21 Followers

Home

About

2 days ago

How to investigate systems using Yara rules to find evil along with yara rule anatomy

Yara is a tool that will help you to scan systems for malicious activity and it needs rules for that. The rules will be used to detect malware, classify malware, compromise assessment etc. During major incidents, yara rules are shared by the community. …

Yara

7 min read

How to investigate systems using Yara rules to find evil along with yara rule anatomy
How to investigate systems using Yara rules to find evil along with yara rule anatomy
Yara

7 min read


3 days ago

How to analyze powershell obfuscated code, Part-3

In this part we will analyze the same obfuscated powershell code in another way. Here is the 1st and 2nd part: How to analyze powershell obfuscated code, Part-1 Nowadays its very much certain that you will get obfuscated type of powershell code while analyzing any APT behavior or…mahim-firoj.medium.com How to analyze powershell obfuscated code (this one is base64), Part-2 This is the continuation of my previous part-1.mahim-firoj.medium.com

Powershell

6 min read

How to analyze powershell obfuscated code, Part-3
How to analyze powershell obfuscated code, Part-3
Powershell

6 min read


6 days ago

How to conduct incident response using LOKI scanner to detect malicious activity

LOKI is a IR tool created by Florian Roth. This tool will help you during the incident response situation when you are tasked to find malicious activity on the compromised system. After download the repo for linux, you will get loki.py tool there. Download for Linux: GitHub - Neo23x0/Loki: Loki - Simple IOC and YARA Scanner Loki - Simple IOC and YARA Scanner. Contribute to Neo23x0/Loki development by creating an account on GitHub.github.com

Loki

3 min read

How to conduct incident response using LOKI scanner to detect malicious activity
How to conduct incident response using LOKI scanner to detect malicious activity
Loki

3 min read


6 days ago

Implement http security headers on webserver

Nowadays more websites are compromised and the data are exposed to the hackers or in the dark web. Most of these incidents are due to misconfiguration or lack of protection from the server or system team. Because from the system side they just want for the website to work only…

Web Server

3 min read

Implement http security headers on webserver
Implement http security headers on webserver
Web Server

3 min read


Sep 16

How to scan systems with THOR lite scanner during compromise assessment and incident response

In this post, I tried to consolidate informations of thor-lite that I think will be helpful for IR folks. First we need to know what is Thor lite scanner? It is a compromise assessment tool developed by Nextron-systems and Florian Roth. This tool is used for detecting malicious activity in…

Thor Lite

5 min read

How to scan systems with THOR lite scanner during compromise assessment and incident response
How to scan systems with THOR lite scanner during compromise assessment and incident response
Thor Lite

5 min read


Sep 15

LetsDefend powershell-script challenge writeup

Challenge link: https://app.letsdefend.io/challenge/powershell-script Let’s explain some of the powershell parameters. -NoP: This parameter stands for "NoProfile." It tells PowerShell not to load the user's profile (profile scripts) when starting. This can be useful for running scripts without interference from user-specific settings.

Powershell

4 min read

LetsDefend powershell-script challenge writeup
LetsDefend powershell-script challenge writeup
Powershell

4 min read


Sep 14

LetsDefend pdf-analysis challenge writeup

I have download the challenge from letsdefend and put it on my sansforensics machine. Don’t execute the pdf files in your machine. Its malicious. Challenge link: https://app.letsdefend.io/challenge/pdf-analysis Note: I will be telling you the answers here. But that does not mean you will not try it by yourself. So please…

Lets Defend

3 min read

LetsDefend pdf-analysis challenge writeup
LetsDefend pdf-analysis challenge writeup
Lets Defend

3 min read


Sep 14

How to deobfuscate or decode or unminify JavaScript code

eval(function(p,a,c,k,e,r){e=String;if(!''.replace(/^/,String)){while(c--)r[c]=k[c]||c;k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('(0(){4 1="5 6 7 8";0 2(3){9(3)}2(1)})();',10,10,'function|b|something|a|var|some|sample|packed|code|alert'.split('|'),0,{})) How will you know this is javascript code? When you see, eval(function(p,a,c,k,e,r), replace, while, new RegExp are used then it is JavaScript code. Or you can verify this by using various online tools. Even in medium, when you paste this in…

JavaScript

1 min read

How to deobfuscate or decode or unminify JavaScript code
How to deobfuscate or decode or unminify JavaScript code
JavaScript

1 min read


Sep 9

How to make .exe file from c code using visual studio 2022

I am assuming that you have already installed visual studio 2022 with necessary dot net frameworks and updates. Let’s start visual studio 2022 Click continue without code.

Visual Studio

3 min read

How to make .exe file from c code using visual studio 2022
How to make .exe file from c code using visual studio 2022
Visual Studio

3 min read


Sep 5

CNAME dns record explanation

Cname is the canonical name. Say your nick name is Avi and your full name is Md. Mahim Bin Firoj. So when people call Avi then actually Md. Mahim Bin Firoj replies. Here Avi is the alias and cname is Md. Mahim Bin Firoj. Cname records always points a domain…

Cname

3 min read

CNAME dns record explanation
CNAME dns record explanation
Cname

3 min read

Md. Mahim Bin Firoj

Md. Mahim Bin Firoj

21 Followers

Security Enthusiast

Following
  • inginformatico

    inginformatico

  • DCSO CyTec Blog

    DCSO CyTec Blog

  • SOCFortress

    SOCFortress

  • Florian Roth

    Florian Roth

  • Digit Oktavianto

    Digit Oktavianto

See all (57)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams