Author: CyberDudeBivash Powered by: CyberDudeBivash Brand | cyberdudebivash.com Related: cyberbivash.blogspot.com Daily Threat Intel by CyberDudeBivash Zero-days, exploit breakdowns, IOCs, detection rules & mitigation playbooks. Follow on LinkedIn Apps & Security Tools CyberDudeBivash News • Threat Intelligence • Lateral Movement THE PUTTY TRAP: How Hackers are Weaponizing Legitimate SSH Tools for Undetectable Lateral Movement and Data Exfiltration By CyberDudeBivash News Desk • Defensive Security Advisory cyberdudebivash-news.blogspot.com Security note: This article focuses on detection, prevention, and response. It intentionally avoids tactical misuse details and offensive instructions. ...
Malware Analysis Cheat Sheet (2025) A fast reference for security analysts and incident responders. Updated for 2025 threats and analysis techniques. Focus: Efficiency and rapid identification of key indicators. by Bivash Kumar Nayak Core Stages of Malware Analysis There are three main phases: Static Analysis, Dynamic Analysis, and Reverse Engineering. 1 Static Analysis Examine malware without execution. 2 Dynamic Analysis Observe malware behavior in a controlled environment. 3 Reverse Engineering In-depth code analysis to understand inner workings. 1. Static Analysis: Initial Triage Purpose: Quick overview to identify basic characteristics. File Hashing Identify known malware families using VirusTotal. File Type Identification Determine file type (PE, ELF, Mach- O). Strings Extraction Extract URLs, IP addresses, filenames. Static Analysis: Deeper Dive Purpose: Uncover hidden information and potential functionality. Header Analysis Check import/export tables for suspicious functio...