Week Eight – Uncommon Languages as a Security Bypass

Typical organizational security measures include signature, or even context recognition to identify malware inside the network. Attackers, forever creative, have begun to utilize less common languages to either write their malware, or for use as a file dropper to write the malware to the disk or into memory. There are several reasons why an attackerContinue reading “Week Eight – Uncommon Languages as a Security Bypass”

Week Six – The Importance of System Relevance

As humans we naturally age, and as expected so do information systems, software, techniques and their associated networks. This system aging can become a problem for organizations who neglect to dedicate enough resources to advancing their systems and keeping them up to date. This is even more important due to the rapid pace in whichContinue reading “Week Six – The Importance of System Relevance”

Week Four – Remote Code Execution

Remote code execution is a method of attack whereby the attacker is able to send commands to the remote computer which then executes those commands. In most cases, these remote code executions are malicious in nature and are not authorized by the system owner. Remote code execution is generally the second attack on a systemContinue reading “Week Four – Remote Code Execution”