Month: October 2019

OSINT | Securium Solutions

MALTEGO – OSINT TOOL

Hey guys back again with another Blog, Today, we are going to take a small tour on Maltego, a Open source Intelligent tool which is currently having lot of aspects in Information gathering purposes. Maltego gives lot of information on targets of different fields like Forensics, Personal, and entertainment also like Movies Analysing. Maltego works …

MALTEGO – OSINT TOOL Read More »

Cam scanner threat | Securium Solutions

ALERT : CAM SCANNER IS NO MORE SECURE

One of the most using scanner by millions of people around the world with Optical Character Recognition (OCR) in CAM SCANNER is found to be Not Secure Peoples are using this application to scan lot of sensitive information like Certificates, Photos, ID details, Bank passbook Details to convert the format into JPEG, PDF. Kaspersky Researchers …

ALERT : CAM SCANNER IS NO MORE SECURE Read More »

VUlnerable WEp application | Securium Solutions

ARBITRARY FILE UPLOAD VULNERABILITY AT VARIOUS SECURITY LEVELS

Good Afternoon all, DVWA – DAMN VULNERABLE WEB APPLICATION. Some of you guys know well about DVWA, but this one is specially for beginners in cyber security, it may help someone who looks for arbitrary file upload Tutorial or Blogs Regarding that. You guys can download DVWA package from their website to host it in …

ARBITRARY FILE UPLOAD VULNERABILITY AT VARIOUS SECURITY LEVELS Read More »

Yara Code

CREATION OF SIMPLE YARA RULE

Good Afternoon all, Today we will be looking forward to set up a simple yara rule using the details we found in Malware analysis like strings, PE header details, Signature details, and File type Details. Ok Let Dive in, Fire up Your Malware Analysis FlareVM operating system, then Open a Malware sample in pestudio Application. …

CREATION OF SIMPLE YARA RULE Read More »

Threat analysis | Securium solutions

MALWARE ANALYSIS BASIC APPROACH

Hey Everyone, today we will be learning how to analyse Basic simple Malware sample by using Static analysis. I have uploaded the sample Malware Files in this link, you can download it from here. Its always advisable to use the malware files in compressed and protected format, The Password to decompress the file is infected. …

MALWARE ANALYSIS BASIC APPROACH Read More »