Open in app

Sign In

Write

Sign In

Bogdan Vennyk
Bogdan Vennyk

73 Followers

Home

About

Oct 25, 2021

Flare-on 8 task 9 write-up

It has been couple days since annual Eighth Flare-On challenge has ended, shout out to organizers for this amazing CTF and all participants who successfully completed all challenges! …

Security

8 min read

Flare-on 8 task 9 write-up
Flare-on 8 task 9 write-up
Security

8 min read


May 7, 2021

Zero2Automated — Custom Sample analysis

It took me quite a bit to finally find time to work through this amazing course made by @0verfl0w_ and @VK_Intel. …

Security

7 min read

Zero2Automated —  Custom Sample analysis
Zero2Automated —  Custom Sample analysis
Security

7 min read


Jan 31, 2021

When Red Team became Blue Team

The other day I read amazing presentation from Black Hills Information Security about how Blue Team can benefit from using Red Team tools and techniques to improve general security posture and their detection capabilities and started thinking if this works the other way. …

Security

5 min read

When Red Team became Blue Team
When Red Team became Blue Team
Security

5 min read


Jul 5, 2020

Building (not ML driven) Ransomware prevention system

Because Ransomware attacks are currently number one cyber threat — techniques, tools and procedures for their detection and response become more and more important. There are a lot of ways how you can start detecting ransomware activity on your endpoint or network. For example catching creation of thousands DECRYPT_ME.txt on…

Security

4 min read

Building (not ML driven) Ransomware prevention system
Building (not ML driven) Ransomware prevention system
Security

4 min read


Jun 14, 2020

How to avoid falling down the rabbit hole while analyzing malware

So far you got your first sample either during ongoing Incident Response or your are just studying (you can use this automated tool to collect in the wild samples). What are your next steps? Load sample to IDA and give it a try? …

Security

8 min read

How to avoid falling down the rabbit hole while analyzing malware
How to avoid falling down the rabbit hole while analyzing malware
Security

8 min read


Sep 1, 2019

Intro into Reverse Engineering with cats and memes

Special thanks to FLARE team for their annual FLARE-On challenges! In this article I would like to show you how reverse engineering process looks like, where to put attention and some tricks I use. Let’s get started! I will use special FLARE-On Level from BHUSA2019 as example. …

Security

5 min read

Intro into Reverse Engineering with cats and memes
Intro into Reverse Engineering with cats and memes
Security

5 min read


Jan 26, 2019

Wild hunt or how you can automate process of malware collection

When you only start learning malware analysis, it is always frustrating to find malicious samples, as those from practical malware analysis labs are a little bit old and you have already mastered them. These thoughts pushed me to research different malware sources and ways to automate this routine. Here is…

Development

4 min read

Wild hunt or how you can automate process of malware collection
Wild hunt or how you can automate process of malware collection
Development

4 min read

Bogdan Vennyk

Bogdan Vennyk

73 Followers

Threat hunting. Malware Analysis. Red teaming.

Following
  • HackingDave

    HackingDave

  • Jon Hencinski

    Jon Hencinski

  • vixentael

    vixentael

  • LeOleg

    LeOleg

See all (10)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams