Categories

Category Archives: All Things Dev

A behind-the-scenes look at our technical processes from the ever-so-talented Malwarebytes developers.

Open Source Laptop

A completely from scratch, hand built “hacker” laptop.

Memory scan

Why do anti-viruses and Malwarebytes Anti-Malware scan your computer’s memory?

DEFCON 21: An Odyssey

A little story about my adventures in hacker land at DEFCON 21.

Oh, the Sites You Will Never See

Malwarebytes Website Blocking function explained.

Anonymizing Traffic for your VM And Capturing Traffic

Security Level: High / Hardcore Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks AND being able to perform dynamic malware analysis and capture malicious traffic moving between the malware and the C&C. (Whew, that’s a lot of ANDs. =D) Benefits: Hide your […]

Anonymizing Traffic For Your VM

Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather […]

Anonymizing Traffic for your Host System

Security Level: Light Purpose: To hide who you are while performing research through your browser. Benefits: Hide your IP Easy to set up Can be run off of a USB stick Drawbacks: Drive-by attacks can still lead to the infection of your host system. Can only hide traffic going out of HTTP port(s). Not meant […]

WARNING: The information included in this tutorial could be used for malicious purposes in the wrong hands, please expect to be yelled at by people who think you are a bad guy if you start talking about this or asking questions. Also, please use responsibly. Hello everyone! Today I am going to give a detailed […]

Subscribe to our YouTube Channel