Author Archive

Implementing a VPN throught text files

During our last audit, we encountered a network architecture that aroused our curiosity. The architecture was composed of two segregated networks. Those two networks completely separated but could both access a storage filesystem replicated in both networks by a central… Continue Reading →

Malware Analysis – GTHROTROW.EXE

At the beginning of February, we received a strange business proposal by email. The email seemed authentic, so did the attachment, until we noticed something was wrong. Email attachment Despite the Adobe Acrobat icon, the attachment of the email is… Continue Reading →