How To Build a Malware Analysis Sandbox Using Cuckoo

Along of 2017, We had known that the attacking of malware especially ransomware-wannacry was been the media headline news. Many people including both of private and governments should give all of their resources for taking over those incidents. According to the Mid-Year’s 2017 Cyber Attacks Report published by Check Point Software Technolgies Ltd, there are three main categories of malware attack Continue reading

Make a “Maliciouse Document” – Macro exploit in Ms Word Using The Fatrat

malicious docHallo Sudo-ers,

After posting about the simple exploit tool (but powerfull) named The FatRat before, We will show you a simple Proof of Concept (PoC) one of features the tool in which make a “maliciouse document”- by exploiting a Macro feature in Microsoft Word 2013.

Continue reading

TheFatRat a Massive Backdoor Tool

Hallo Sudo-ers,

Today I will show you a simple tool but powerfull for exploitating a target either windows based, mac os, linux , android and others such as php etc. The tool can create a malware which obfuscate the Antivirus, so the malware can bypass security of the host in which use a AV for securing it.

We can run this tool on various operating systems such as : Continue reading