Skip to content

Keystrokes

Month: February 2016

MalwareLeave a comment

Classes of Malware based on Behaviour

February 15, 2016February 15, 2016 keystrokes

The standard technical classification of malware is based on the function that the code performs. The most common form of classification that one most commonly comes across is based on the family of malware (CrowTi, Zeus etc. ). The classes … Continue reading Classes of Malware based on Behaviour

MalwareLeave a comment

Formalizing Foundations: Viruses (1936-1948) Part 3

February 13, 2016February 13, 2016 keystrokes

This post is the last in the 3 part series that in the end shows where the beginning artificial life and viruses in program got a real mathematical foothold. Revisiting some of the nomenclature previously defined, we let the enumeration … Continue reading Formalizing Foundations: Viruses (1936-1948) Part 3

MalwareLeave a comment

Formalizing Foundations: Viruses (1936-1948) Part 2

February 12, 2016 keystrokes

Let’s continue where we left of, in part one of the post we looked at the basic definitions of some of the constructs we will use such as: Turing Machines, Recursive and Recursively Enumerable functions, Universal Turing Machine etc. Continuing the topic: … Continue reading Formalizing Foundations: Viruses (1936-1948) Part 2

MalwareLeave a comment

Formalizing Foundations: Viruses (1936-1948) Part 1

February 12, 2016February 13, 2016 keystrokes

The concept of viruses is not something that was brought about after advances in computers. The idea of self-reproducing machines was what lead to its eventual form in code that of us identify with today on hearing the word virus … Continue reading Formalizing Foundations: Viruses (1936-1948) Part 1

MiscellaneousLeave a comment

The Booting Process:Windows

February 12, 2016February 12, 2016 keystrokes

The windows booting process too has many similarities with those explained in the post about the Linux booting process, this is because booting is a process that primarily initiates a connection between the hardware and the Operating System. The booting … Continue reading The Booting Process:Windows

Wireless SecurityLeave a comment

WPA/ WPA2 Dictionary Attack Explained

February 9, 2016February 9, 2016 keystrokes

WPA (Wi-Fi Protected Access) was designed to be an immediate patch to the failings of WEP (Wired Equivalent Privacy) without demanding hardware changes in devices that already ran on WEP. Hence WPA also uses the TKIP encryption algorithm, similar to … Continue reading WPA/ WPA2 Dictionary Attack Explained

MiscellaneousLeave a comment

Preliminary File System

February 5, 2016 keystrokes

Assuming one is familiar with the linux booting process (else click here). This post is simply to note down the method to view the prelimnary file system (initrd) that is used during the booting process. Don’t get confused by the fact … Continue reading Preliminary File System

MiscellaneousLeave a comment

The Booting Process:Linux

February 5, 2016February 12, 2016 keystrokes

The Linux booting process can be broken down into 6 different stages. For legacy’s sake We’ll also take a look at the BIOS boot sequence. The stages could be divided into: BIOS [1]   |  UEFI [2] MBR [1]   … Continue reading The Booting Process:Linux

MalwareLeave a comment

The Byte-Code Battle

February 3, 2016February 3, 2016 keystrokes

Have you ever cursed your Anti-Virus Software for being ineffective or felt the anti-virus wasn’t worth the money or the hype for all the protection it supposedly offered? Most of us have. That’s actually one of the reasons that led … Continue reading The Byte-Code Battle

Reverse EngineeringLeave a comment

Portable Executable File Format

February 2, 2016February 9, 2016 keystrokes

The main reason for the fact that software that is built on one system , runs on another system without much extra effort is a data structure known as Portable Executable Format (here we are specifically referring to Windows systems, … Continue reading Portable Executable File Format

Posts navigation

Older posts

Recent Posts

  • Symmetric and Asymmetric Ciphers: A comparison
  • Survey on Image Steganography Techniques
  • Preliminary Static Analysis of Malware
  • Experiments with PE section and Assembly: Flexibility of Section Definition
  • PE File structure: Sections

Recent Comments

Archives

  • January 2017
  • August 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016

Categories

  • Cryptography
  • Machine Learning
  • Malware
  • Miscellaneous
  • Networks
  • Research
  • Reverse Engineering
  • Security
  • Steganography/Steganalysis
  • Tools
  • Wireless Security

Meta

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.com
Advertisements
Create a free website or blog at WordPress.com.
Cancel