Penguin’s secretes: Evidence collection in Linux

Date: 06/02/2025

Hey, bro, are you aware that Windows is dead? Everyone is switching to free software nowadays. You’re a hacker security guy, right? So, your job is to ensure security. And here’s an interesting case to be investigated: a Linux computer and an incident that occurred with it. Or maybe no incidents occurred, but you still have to check whether everything is clean. Do you know what to do in such situations? If not, we’ll tell you now. And even if you do, we strongly recommend to review this article anyway. It provides recipes for all occasions and presents an efficient set of powerful tools. Enjoy the reading!
Read full article →

Dissecting Viber. How to analyze Android apps

Date: 04/02/2025

Once, while being on a job search, I received an interesting test assignment: analyze Viber for Android, find vulnerabilities in it, and exploit them. Using this episode as an example, I will demonstrate you an efficient approach that can be used to analyze real apps and obtain results in a short time. Joking aside: if you go through all the steps described below, you have a good chance to find a 0-day vulnerability in Viber. 😉
Read full article →