Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

Ghost in the Shellcode 2015 Write-up, Forensics 200: “CloudFS”

We began with no hint, and the file ‘cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2’.  The command file tells us that it is compressed data. $ file cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2...

Recent Posts

  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing
  • Target Audiences In Cyber Security
  • (Automated) Vulnerability Analysis is Hard

Archives

  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • June 2016
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized