Welcome to GoggleHeadedHacker
Debugging Using Radare2… and Windows!
26 February 2018
To start off I want to say I am a Linux person. I use it all the time for development. The command-line is amazing and very streamlined for computer-science related tasks. While I feel this way, there are those who do not and would prefer to use a Windows environment instead. So I want to show two things in this article, how to install and use radare2 for Windows, and also how to debug applications using radare2.
[Environment]::SetEnvironmentVariable(“Path”, $env:Path + “;C:\Users<username>\AppData\Local\Programs\radare2”, [EnvironmentVariableTarget]::Machine)
Linux Malware Analysis—Why Homebrew Encryption is Bad
02 February 2018
Linux is one of my favorite operating systems, but you seldom see malware for it, so I was pretty interested when Linux Malware was caught by my honeypot. This article will be my analysis of the sample, particularly the decryption function that was used throughout it. It’s a good example of why using your own encryption algorithm isn’t very secure.
11 January 2018
So this is my analysis on the snojan malware. My goal for my articles is to write about different malware samples that I collect in my honeypot. I hate finding a sample and looking up analyses on it only to find that nobody has taken the time to really look at it, so this is my remedy for that.
Reverse Engineering Using Radare2 - Part 2
21 December 2017
This article is a continuation of my first article “Reverse Engineering Using Radare2” where I gave a basic introduction to the tool. I highly suggest starting there if you haven’t already, as it covers the very basics.
Reverse Engineering Using Radare2
16 December 2017
This article assumes the reader has some basic knowledge in coding and assembly language. If not, a good resource for this would be the assembly tutorial from tutorialspoint.