prfalken.org
Open in
urlscan Pro
2001:41d0:301::31
Public Scan
URL:
https://prfalken.org/
Submission: On December 28 via api from BE — Scanned from FR
Submission: On December 28 via api from BE — Scanned from FR
Form analysis
1 forms found in the DOMGET https://prfalken.org/
<form role="search" method="get" action="https://prfalken.org/" class="wp-block-search__button-inside wp-block-search__icon-button wp-block-search"><label class="wp-block-search__label screen-reader-text" for="wp-block-search__input-1">Search</label>
<div class="wp-block-search__inside-wrapper "><input class="wp-block-search__input" id="wp-block-search__input-1" placeholder="" value="" type="search" name="s" required=""><button aria-label="Search"
class="wp-block-search__button has-icon wp-element-button" type="submit"><svg class="search-icon" viewBox="0 0 24 24" width="24" height="24">
<path d="M13 5c-3.3 0-6 2.7-6 6 0 1.4.5 2.7 1.3 3.7l-3.8 3.8 1.1 1.1 3.8-3.8c1 .8 2.3 1.3 3.7 1.3 3.3 0 6-2.7 6-6S16.3 5 13 5zm0 10.5c-2.5 0-4.5-2-4.5-4.5s2-4.5 4.5-4.5 4.5 2 4.5 4.5-2 4.5-4.5 4.5z"></path>
</svg></button></div>
</form>
Text Content
Skip to content PrFalken's Cyber Security Journey * About PrFalken's Cyber Security Journey Main Menu * About OBSCURCISSEMENT, INJECTION ET SHELLCODE: LE HACKING SOUS L’OEIL DE L’ASSEMBLEUR X64 – BOOK REVIEW Leave a Comment / Review / PrFalken This review is in french because the book only exists in french J’avais vu l’annonce de ce livre à en septembre 2023 via LinkedIn et je l’avais commandé sur Amazon en me disant que je le lirai plus tard. Etant coincé chez moi toute la semaine à cause d’un mal de dos épouvantable, j’en […] Obscurcissement, injection et shellcode: Le hacking sous l’oeil de l’assembleur x64 – Book Review Read More » DEADSEC CTF 2024 – MIC CHECK Leave a Comment / CTF / PrFalken This is a small write-up of the “Mic check” challenge from DeadSec CTF 2024 (Misc Category). The difficulty was easy and it was a kind of stuff that appears often in CTF challenges. Description : mic is it ok?mic is it ok? A link is to start a docker container and the command to connect DeadSec CTF 2024 – Mic check Read More » SANS FOR610 TRAINING & GREM – CERTIFICATION REVIEW Leave a Comment / Malware Analysis, Review / PrFalken SANS FOR610 Training The full name of the FOR610 training from SANS is “Reverse-Engineering Malware: Malware Analysis Tools and Techniques”. The goal is to learn how to efficiently analyze malwares in various forms (mainly Windows and Script files) depending on what is the purpose of the analysis : to understand how a security incident started, SANS FOR610 Training & GREM – Certification Review Read More » FROM ONENOTE TO QUAKBOT (BB12) Leave a Comment / Malware Analysis / PrFalken Attackers started recently to use Microsoft OneNote file to distribute malwares by email. I’ve decided to take a to public sample and analyse it (Thanks @pr0xylife for sharing it !). To proceed, I’ll use my Malware Analysis Lab as described here. I’ll start with a static analysis of the file to discover what will be From OneNote to Quakbot (BB12) Read More » INSTALLING A MALWARE ANALYSIS LAB Leave a Comment / Malware Analysis / PrFalken In order to safely analyze malwares, the very first step is to setup a lab. I’ve read multiple articles about it but I’ve decided to write my own guide compiling all the small details that were important to me. This guide is for beginners and I hope it can help someone starting his journey into Installing a Malware Analysis Lab Read More » UNBOXING A QUAKBOT CAMPAIGN WITH MALCAT Leave a Comment / Malware Analysis / PrFalken I recently received a phishing email to analyze, let’s see how to unbox all the components and identify them using Malcat. We can notice how good is this phishing attempt :– the sender was known by the recipient– the mail was written in correct french (quite unusual)– the mail contains and old discussion from 2021 Unboxing a Quakbot Campaign with Malcat Read More » MS OFFICE DOCUMENTS ANALYSIS Leave a Comment / Miscellaneous / PrFalken *.doc MS Word Document in binary proprietary file format (Compound File Binary Format) used in Office < 2007 *.xls MS Excel Workbook in binary proprietary file format (Compound File Binary Format) used in Office < 2007 *.docx MS Word Document in “Microsoft Office Open XML” file format used since Office 2007, no macro.Zip container with MS Office Documents Analysis Read More » SEETF 2022 – SNIFFED TRAFFIC Leave a Comment / CTF / PrFalken This is a small write-up of the “Sniffed Traffic” challenge from SEECTF 2022 (Forensics Category). Description : Author: EnyeiWe inspected our logs and found someone downloading a file from a machine within the same network.Can you help find out what the contents of the file are?For beginners: https://www.javatpoint.com/wiresharkMD5: 71cd3bdbecece8d7919b586959f2d3b7 Solution : Once the capture file SEETF 2022 – Sniffed Traffic Read More » PICOCTF 2022 – X-SIXTY-WHAT Leave a Comment / CTF / PrFalken This is a small write-up of the “x-sixty-what” challenge from picoCTF 2022 (Binary Exploitation Category). The challenge is now available in picoGym here ! Description : Overflow x64 code Most problems before this are 32-bit x86. Now we’ll consider 64-bit x86 which is a little different! Overflow the buffer and change the return address to picoCTF 2022 – x-sixty-what Read More » PICOCTF 2022 – TORRENT ANALYZE Leave a Comment / CTF / PrFalken This is a small write-up of the “Torrent Analyze” challenge from picoCTF 2022 (Forensics Category). The challenge is now available in picoGym here ! Description : SOS, someone is torrenting on our network. One of your colleagues has been using torrent to download some files on the company’s network. Can you identify the file(s) that picoCTF 2022 – Torrent Analyze Read More » Post pagination 1 2 Next → Search RECENT ARTICLES * Obscurcissement, injection et shellcode: Le hacking sous l’oeil de l’assembleur x64 – Book Review * DeadSec CTF 2024 – Mic check * SANS FOR610 Training & GREM – Certification Review * From OneNote to Quakbot (BB12) * Installing a Malware Analysis Lab ARCHIVES * October 2024 * July 2024 * April 2023 * February 2023 * January 2023 * July 2022 * June 2022 * March 2022 Copyright © 2024 PrFalken's Cyber Security Journey