Featured image of post Inside Mamba: A Technical Exploration into Ransomware

Inside Mamba: A Technical Exploration into Ransomware

Explore the Mamba ransomware through dynamic analysis, memory forensics, and kernel debugging to examine how the malware works and whether recovery is possible without the original password. The result is an in-depth look at an unsophisticated but effective form of ransomware.

Featured image of post Configuring a Virtual Machine for Malware Analysis

Configuring a Virtual Machine for Malware Analysis

A step-by-step guide to setting up a virtual machine tailored for malware analysis, covering OS installation, tool selection, and hardening. Designed for safe, realistic, and practical reverse engineering workflows.

Featured image of post Breaking Flawed Elliptic Curve Cryptography Using Secp256k1

Breaking Flawed Elliptic Curve Cryptography Using Secp256k1

Reverse engineering a C++ CrackMe distributed as an AppImage, using Ghidra and GDB to analyze a secp256k1-based key validation routine. Explores public key generation from partially known secrets and automates key recovery with Pollard’s kangaroo algorithm.

Featured image of post Full Reverse Engineering Workflow of a Small Virtualized CrackMe

Full Reverse Engineering Workflow of a Small Virtualized CrackMe

Analysis of this CrackMe covers the structure of a virtual machine at a granular level, including the fetch-decode-dispath-handle process. A custom Ghidra processor is developed to support disassembly and decompilation of the VM bytecode. Lastly, two approaches are explored to recover valid input: symbolic execution via a custom Ghidra extension (Ghimera), and manual algorithm identification.