Saturday, March 26, 2022

A Token Post

First, a little bit of catch-upIt's been a little while since I wrote anything for this blog. I've had another entry sitting in draft phase for several years, on the topic of automating wireless traffic interception with evil twin access points, but I never quite finished developing the tool that I...

Saturday, October 6, 2018

A Wolf in Fox's Clothing

A couple of weeks ago, a friend dropped me a sample of some malware that he encountered in his network (thanks @0daySimpson). It's written in javascript, and although most of it is pretty intelligible, there's a lovely section of obfuscated code that hides its intent very effectively. The challenge?...