A writeup of the Chapter 1 Labs in Practical Malware Analysis by Michael Sikorski and Andrew Honig
This article assumes knowledge of virtual machines for malware analysis, types of malware, programming, and the PE file format. It is not a walkthrough of the labs, but rather my observations of the methodologies practiced in them.
When faced with unwanted intrusion on a machine or network, malware is any form of software that causes harm or affliction to users, computers, or networks themselves. …
A quick guide on subnetting an IPv4 network
Internet Protocol version 4 (IPv4) addressing only allows for a 32-bit, or 4-byte address. In binary, this address would be represented as:
4 contiguous bytes, or 32 bits
However, IPv4 is expressed in decimal format. So, the translation of the address above would be 255.255.255.255
Because of this format, there are only a little under 4.3 billion addresses possible. Subnets come into play in order to segment and expand IP networks, allowing for way more than 4.3 billion devices to connect to the internet via IPv4. …
An introduction to ethernet and how it works over a SOHO LAN
Ethernet is by far the most widely used form of networking. Within a Small Office/ Home Office (SOHO) Local Area Network (LAN), ethernet is king due to its reliability, reasonable costs, and super quick speeds. This type of environment is one you might expect in your own home or at your favorite café.
Typically, within a small office or home office, you or your business would start with an ordinary router. Today, routers have been designed to serve multiple functions across multiple layers of the network. …
What it is. Why we use it. How it works.
The acronym “OSI” stands for Open Systems Interconnection. We call it a “model”, because it is a point of reference when performing networking operations. It gives us a more simple understanding of the processes that go on closer and closer to the metal when computers are communicating to each other.
When using the OSI Model, it is important to keep in mind that this isn’t the actual system used, but it can help sculpt a specific picture of what is really going on.
Because of its specificity and clear borders…
Computer Science & Cybersecurity Enthusiast