• 
  • 
  • 
  • 616.951.1166
VDA Labs
  • Services
    • Enterprise Security
    • Expert Training
    • Code Security Consulting
    • Hardware Assessments
  • Markets Served
  • From the Experts
  • Events
  • About
    • About VDA Labs
    • Newsletters
    • Careers
  • Contact Us
Select Page
All of Your Data are Belong To Us: The Art of Imaging and Analysis

All of Your Data are Belong To Us: The Art of Imaging and Analysis

Jul 27, 2020 | Auditing, Forensics, Incident Response, Malware Analysis

All of Your Data are Belong To Us: The Art of Imaging and Analysis VDA labs is brought into many different types of situation where a client may want imaging and analysis. From diagnosing patient zero during a malware outbreaks to employee espionage taking system...
Automating GHIDRA: Writing a Script to Find Banned Functions

Automating GHIDRA: Writing a Script to Find Banned Functions

Mar 9, 2019 | AppSec, Exploit Development, Malware Analysis

At VDA Labs we get excited about Reverse Engineering tools, and the recent release of NSA’s GHIDRA does not disappoint. The fact that it is free, supports many different CPU architectures, contains decompiler functionality, and allows many Reverse Engineers to...
Finding DLL Name from the Process Environment Block (PEB)

Finding DLL Name from the Process Environment Block (PEB)

Sep 19, 2018 | Malware Analysis

We often encounter software, especially when performing malware analysis, that dynamically constructs it’s own import table. This can be done for a variety of reasons and in a variety of ways. In this article, we’ll explore one method recently...

Recent Posts

  • Citrix ADC (Netscaler ADC) Multi-Factor Bypass
  • Creating Mayhem: Crashing MP3gain for Fun and CVEs
  • All of Your Data are Belong To Us: The Art of Imaging and Analysis

Archives

Categories

Home Markets Served From the Experts Events About Contact

Copyright © VDA Labs. All Rights Reserved • Privacy Policy • Site by Kreativ Logo

  • Follow
  • Follow
  • Follow