I was just looking around for vids about how to analyze .eml files with cyberchef and I stumbled upon this. I didnt realize how much obfuscation played into the designing malicious code! You read through that so well!!
Amazing content!! Keep with your nice job!! One question, how do hackers hide themselves behind dns if this service requires identification, credit card number, name etc?
Thank you! I’m not 100% sure, but I would assume they use fake or stolen details to register the domains. They might also leverage the legitimate domains of machines/businesses that they’ve compromised :)
I was just looking around for vids about how to analyze .eml files with cyberchef and I stumbled upon this. I didnt realize how much obfuscation played into the designing malicious code! You read through that so well!!
Thx for the content, any plans to reverse the 2nd stage?
yea that woud be cool
Yes, Potentially in future :) I’d like to make some content on shellcode and this would be a good example
Amazing content!! Keep with your nice job!! One question, how do hackers hide themselves behind dns if this service requires identification, credit card number, name etc?
Thank you!
I’m not 100% sure, but I would assume they use fake or stolen details to register the domains. They might also leverage the legitimate domains of machines/businesses that they’ve compromised :)