HACKERS ARISE

  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
  • About Us
    • About
    • OTW on Twitter
    • Master OTW on Youtube
  • Blog
  • Getting Started
  • Books
  • Store
    • Training Platform
    • Autographed Books
  • Training
    • Courses
      • List of Courses
      • Live Training Schedule
    • Training Packages
      • Compare Packages
      • Member Gold
      • Subscriber
      • Subscriber PRO
      • Member
      • DFIR
      • SDR
  • Services
    • Advertising
    • Hackers for Hire
    • Digital Forensics Investigator for Hire
  • F.A.Q.
Start Hacking

Category: Malware

The Medusa Ransomware Threat: Anatomy of a Cybercrime Operation

March 17, 2025March 17, 2025Occupy The Web

Welcome back, aspiring cyberwarriors! In Greek mythology, Medusa was once a beautiful woman until Athena’s curse transformed her into a winged creature with a head full of snakes. She is seen as both a monster and a protector, possessing the power to turn anyone who gazes upon her face to stone. Ransomware groups often adopt […]

Continue Reading

Malware Analysis: Process Injection in the REMCOS RAT

February 14, 2025February 14, 2025Occupy The Web

Process injection is one of those stealthy techniques malware loves to use to stay under the radar. By injecting malicious code into legitimate processes, attackers can hide in plain sight, making detection a real challenge. In this post, I’ll walk you through an actual malware sample that uses process injection, breaking down how it works. […]

Continue Reading

Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis

December 30, 2024January 15, 2025Occupy The Web

Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built to obfuscate, encrypt, and evade, but like any malware, it leaves behind clues. In this series, I’ll walk you through the process of analyzing Cactus ransomware, starting with static analysis. […]

Continue Reading

Reverse Engineering Malware, Part 5: OllyDbg Basics

December 29, 2023September 25, 2024Occupy The Web

In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and espionage agencies such as the CIA and NSA, regularly re-purpose malware for other purpose. Previously, we looked at the basics of IDA Pro, the most widely used disassembler in our industry. In this […]

Continue Reading

Reverse Engineering Malware: Getting Started with Ghidra, Part 1

December 12, 2023September 25, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! There are a number of excellent tools available to use in the field of reverse engineering (see Reverse Engineering, Part 3: Getting Started with IDA Pro and Part 5: Getting Started with OllyDbg ), but now we have an excellent new option known as Ghidra. Ghidra was developed by […]

Continue Reading

Reverse Engineering Malware: Reversing and Disassembly Tools

December 12, 2023September 25, 2024Occupy The Web

Welcome back, my aspiring malware analysts! In previous tutorials here, I have demonstrated the power of such reversing and disassembly tools as Ollydbg, IDAPro and Ghidra. In this tutorial I’d like to share and demonstrate a few simpler tools that you are certain to want to have in your malware analysis toolbox. Each of these […]

Continue Reading

Reverse Engineering Malware, Part 5: OllyDbg Basics

December 12, 2023January 3, 2024Occupy The Web

In this series, we are examining how to reverse engineer malware to understand how it works and possibly re-purposing it. Hackers and espionage agencies such as the CIA and NSA, regularly re-purpose malware for other purpose. Previously, we looked at the basics of IDA Pro, the most widely used disassembler in our industry. In this […]

Continue Reading

Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware

December 11, 2023September 25, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! Reverse engineering is one of the most highly sought and most valuable cybersecurity/infosec skills. Few people have developed their skill levels to be proficient in this highly sought after skill. Ghidra is a relatively new and free reverse engineering tool from the US spy agency, NSA. In this tutorial, […]

Continue Reading

Reverse Engineering Malware, Part 1: Getting Started

December 11, 2023September 25, 2024Occupy The Web

In my introductory article in this new series, I attempted to lay out the merits of why you should study Reverse Engineering Malware. I’m hoping that you found that argument compelling enough that you have come back and are ready to dedicate yourself to this exciting discipline. I’m sure your hard work and dedication will […]

Continue Reading

Reverse Engineering Malware: Getting Started with Ghidra, Part 2

December 9, 2023January 2, 2024Occupy The Web

Welcome back, my aspiring cyber warriors! Reverse engineering malware is among the highest-level skill sets in our discipline and it’s salaries reflect elevated position in the cyber security ecosystem. It requires years of diligent study to become proficient and this is good place to start. If you have not yet done so, go back and […]

Continue Reading

Posts navigation

Older posts

Hackers-Arise Newsletter

Explore the latest cybersecurity news and insights from Master OTW!

Categories

  • AI
  • Anti-Forensics
  • Bitcoin
  • Bluetooth
  • Bug Bounty
  • Cellphones
  • Cryptocurrency
  • Cryptography Basics
  • Cyber Threat Intelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarrior
  • Data Analytics
  • Data Dumps
  • Defensive Security
  • Digital Forensics
  • DoS
  • Email Dumps
  • Exploit Development
  • FemtoCell
  • GPS
  • Hacking
  • ICS
  • InfoSec
  • IoT
  • IoT Hacking
  • Linux
  • Lock Picking
  • Malware
  • Metasploit
  • Network Basics
  • Offesnsive Security
  • OSINT
  • ParamSpider
  • Pentesting
  • Physical Security
  • Python
  • Ransomware
  • Satellite Hacking
  • SCADA Hacking
  • Scanner
  • Scapy
  • Scripting for Hackers
  • SDR
  • Signals Intelligence
  • Spidering
  • Stingray
  • Ukraine
  • Uncategorized
  • Vulnerabilities
  • White Hat
  • Windows

Recent Posts

  • Open-Source Intelligence (OSINT): Unmasking YouTube with OSINT Tools! May 5, 2025
  • Ukraine/Russia Cyber War! Using SQLi Against Russian Websites, Part 2 May 5, 2025
  • Linux Basics for Hackers: Building a Router with nftables May 5, 2025
  • Kubernetes Hacking: Attacking Kubernetes Clusters Using The Kubelet API April 29, 2025
  • Ukraine/Russia CyberWar! Targeting Russian Websites with SQL Injection April 29, 2025

Twitter

Mi Perfil de Twitter Tweets by three_cube

Twitter

Mi Perfil de Twitter Tweets by three_cube Seguir a @three_cube

DON’T MISS OUT – The best training package for aspiring hackers JUST GOT BETTER

BE THE FIRST TO READ MASTER OTW’S NEW RELEASE Linux Basics for Hackers 2nd eDITION

all the books and training videos you need to start hacking for just $169 NOW INCLUDES the brand new second edition of Linux Basics for Hackers

Discover why thousands of hackers began their journey with Linux Basics for Hackers and why it is rated 4.7 stars with over 2,700 reviews on Amazon.

TAKE COMMAND OF YOUR FUTURE

Learn Linux, Networking, Sec+ 701 certification, Radio Basics, Python, Wi-Fi Hacking, Remaining Anonymous, Cryptography, Wireshark, and Nmap – all in one bundle!

This bundle also includes Master OTW’s highly anticipated upcoming book, Python Basics for Hackers, and bestselling Network Basics for Hackers.

Plus, every month, one lucky purchaser will win

A FREE 3-YEAR TRAINING PACKAGE

CYBER WEEK SALE

35% OFF EVERYTHING

 USE CODE jjt8vpmput1d

ENDS 12/6 AT MIDNIGHT!

Excludes books, but everything else is fair game!