Posts

Showing posts from December, 2019

NMAP- My penetration Testing Guide and Notes

Nmap (Network Mapper) is used for network discovery and security auditing. Nmap can be used to determine whether the hosts are available on the network, listing services those hosts currently offering and their open ports, determine hosts operating system, filter or network protection are in use on the network. Nmap provides great functionality and features. Can be used to scan multiple targets or large network, mapping out networks and it is an open source software. Nmap interactions are on command line, but if you prefer to have a graphical user interface, you can use Zenmap which includes an advanced graphical user interface and results viewer. These notes written by me in my early day when I interested in infosec as my reference when pentesting or trying boxes. I simplified the command and what it do. I also provide this note part by part in my Basic Penetration Testing repository   starting from number 15 to 18 in my Github . Here I provide the link to the not

Android Application Reverse Engineering and Malware Analysis: Analysis environment preparation.

Hi everyone, this time I would like to share my experiences on Android application analysis and reverse engineering preparation. Like every other processes when we need to do something in the world, we have to consider and prepare basic things to have everything executed in a structured and efficient manner. Prior to our analysis for any mobile application, we have to consider a few things to prepare which is: Workstation. Tools and software. Skills require. Considering and preparing these components will significantly improve your readiness and response time when the sample is acquired and needs to be examined. WORKSTATION For a workstation, this is the specification that at least you should have: Minimum Quad core  processor and support Virtualization . Currently I have 4 cores with 8 threads processor. Malware analysis and reverse engineering process is resource intensive, more is better to support virtualization and heavy processing. During my analy