In this blogpost we are going to look into hooks, how to find them, and how to restore the original functions.
What ISO27002 has in store for 2022
In current times, security measures have become increasingly important for the continuity of our businesses, to guarantee the safety for our clients and to confirm our company’s reputation. While thinking of security, our minds will often jump to the ISO/IEC 27001:2013 and ISO/IEC 27002:2013 standards. Especially in Europe & Asia, these have been the leading … Continue reading What ISO27002 has in store for 2022
Girls Day at NVISO Encourages Young Guests To Find Their Dream Job
NVISO employees in Frankfurt and Munich showcased their work in Cybersecurity to the girls with live hacking demos, a view behind the scenes of NVISO and hands-on tips for their personal online security. Participating in the Germany- Wide "Girls Day", we further widened the field of future career choices for the young visitors and brought … Continue reading Girls Day at NVISO Encourages Young Guests To Find Their Dream Job
Analyzing a “multilayer” Maldoc: A Beginner’s Guide
In this blog post, we will not only analyze an interesting malicious document, but we will also demonstrate the steps required to get you up and running with the necessary analysis tools. There is also a howto video for this blog post. I was asked to help with the analysis of a PDF document containing … Continue reading Analyzing a “multilayer” Maldoc: A Beginner’s Guide
Keep on running ahead: NVISO’s Training Program
When you work for NVISO, we invest heavily in your personal development: to ensure you reach your full potential as a top class cyber security specialist.
Kernel Karnage – Part 2 (Back to Basics)
This week I try to figure out “what makes a driver a driver?” and experiment with writing my own kernel hooks. 1. Windows Kernel Programming 101 In the first part of this internship blog series, we took a look at how EDRs interact with User and Kernel space, and explored a frequently used feature called … Continue reading Kernel Karnage – Part 2 (Back to Basics)