-
Recent Posts
- Build nwjs12 for windows
- Deobfuscate Javascript using PhantomJS (Headless browser)
- Angler Exploit kit breaks Referer chain using HTTPS to HTTP redirection
- Instrument Microsoft Office applications to defeat macro obfuscations
- Dealing with pcaps in windows using Fiddler/FiddlerCore
- Extend Sulo to find the CVE of Flash exploits
- Understanding CVE-2015-0310 Flash vulnerability
- Build and use PCRE in windows
Top Clicks
- None
May 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Join 54 other subscribers
Category Archives: Exploit
Deobfuscate Javascript using PhantomJS (Headless browser)
Recently when i got a chance to analyze Neutrino Exploit kit capture, i noticed that Neutrino EK has a detection and check for headless browser and other JS based frameworks. One thing that is interesting about Neutrino EK is all … Continue reading
Angler Exploit kit breaks Referer chain using HTTPS to HTTP redirection
The author(s) behind Angler EK is known to release reliable exploit(s) for flash/IE and to use various techniques to break various logics used by analysis products for the detection. Recently a security researcher blogged about a new technique used by … Continue reading
Posted in Exploit, Exploit Kit, Malware
Tagged Angler EK, Angler EK Analysis, Angler EK Referer chain break, Exploit Kit analysis., ThreatGlass
1 Comment
Instrument Microsoft Office applications to defeat macro obfuscations
With the recent increase in documents with macros used to deliver malwares, researchers spend considerable amount of time to analyze these attached scripts to understand the inner workings. Though the macros does follow the similar pattern in file download and … Continue reading
Extend Sulo to find the CVE of Flash exploits
In this blog, i like to discuss more about detecting the vulnerability triggered by a particular exploit using Sulo. I have extended it to detect few of the recent vulnerabilities. I have added code to detect CVE-2015-0310, CVE-2015-0311 and CVE-2015-0313. … Continue reading
Understanding CVE-2015-0310 Flash vulnerability
The Flash vulnerability CVE-2015-0310 is fixed in recent patch from Adobe. The vulnerability is in RegEx result parsing code. The vulnerability affects all the version below 16.0.0.287 and patched on January 2015. Though Adobe didn’t provide much information about the … Continue reading
Defeat initial packers used in flash exploits using Sulo
Using Sulo it is quite easy to defeat the initial packers used in the recent flash exploits. All we need is setting up one VM environment as i mentioned in my previous blog and in Sulo Github page. Once you … Continue reading
Posted in Exploit, Exploit Kit, Flash Exploit Analysis
Tagged Flash Exploit analysis, Sulo, Sulo and Loader.loadBytes()
8 Comments
Use Sulo to analyze Flash Exploit files
In this blog post, i have decided to blog about my experience in using Sulo for analyzing flash exploit. I have played with Sulo for quite sometime now extending it to newer version of flash and used it to analyze … Continue reading
Angler EK update
Recent Angler EK uses following keys to decrypt the encrypted binaries. unsigned int keys[4]= {0x39525143, 0x75487832, 0x57645730, 0x79356332}; // IE exploitunsigned int keys[4]= {0x47763879, 0x33767545, 0x66706F58, 0x65443372}; // flash exploit (CVE-2015-0311)
Posted in Exploit, Exploit Kit
Tagged Angler EK, Angler EK Analysis, Decrypt binary Angler EK
Leave a comment
Digging deep into Recent Angler Exploit kit Fileless delivery
Recently ThreatGlass released a PCAP related to Angler Exploit kit from wira-ku.com. Looking into this, Angler EK has changed it’s obfuscation techniques to load it’s dropper from the exploit server. Let’s dig into this. The initial dropper is downloaded before … Continue reading
Scanbox Javascript code – Exploit packs
This is the JavaScript code we usually see in exploit packs: function setCookie(id,value,bool){ d=new Date(); if(bool==1) { d.setTime(d.getTime()+365*10*24*60*60*1000); } else { d.setTime(d.getTime()-365*10*24*60*60*1000); } document.cookie = id+”=”+value+”;path=/;expires=”+d.toGMTString();} function getCookie(name) { var arr = document.cookie.match(new RegExp(“(^| )”+name+”=([^;]*)(;|$)”)); if(arr != null) return … Continue reading