From c6d28c72810936b427ea8901ddbdbdf041e62f53 Mon Sep 17 00:00:00 2001 From: cocomelonc Date: Mon, 2 Dec 2024 12:31:49 +0300 Subject: [PATCH] md mz book link to 1st version --- _posts/2024-11-29-mybook-2.markdown | 1 + _posts/2024-11-30-malware-cryptography-35.markdown | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/_posts/2024-11-29-mybook-2.markdown b/_posts/2024-11-29-mybook-2.markdown index b726256..4af0c10 100644 --- a/_posts/2024-11-29-mybook-2.markdown +++ b/_posts/2024-11-29-mybook-2.markdown @@ -82,6 +82,7 @@ Binance email: [zhzhussupovkz@gmail.com](mailto:zhzhussupovkz@gmail.com) If you are unable to pay for it, I will send it to you for free. [MD MZ book 2nd edition](https://drive.google.com/file/d/1-6OQWWGNogTeiWj1AK6i-3bxrf4Bz1Ez/view?usp=sharing) +[MD MZ book 1st version](/book/2022/07/16/mybook.html) > All examples are practical cases for educational purposes only. diff --git a/_posts/2024-11-30-malware-cryptography-35.markdown b/_posts/2024-11-30-malware-cryptography-35.markdown index 23165b0..9cc5123 100644 --- a/_posts/2024-11-30-malware-cryptography-35.markdown +++ b/_posts/2024-11-30-malware-cryptography-35.markdown @@ -20,7 +20,7 @@ Hello, cybersecurity enthusiasts and white hackers! ![cryptography](/assets/images/140/2024-11-30_13-59.png){:class="img-responsive"} -After my presentation at Black Hat MEA 2024, a conference in [Riyadh](https://saudivisa.com/) where I touched on leveraging cryptography on malware for stealthy communication, and after the release of MD MZ Book 2nd edition, I will decide to continue research cryptography in malware development. +After my presentation at Black Hat MEA 2024, a conference in [Riyadh](https://saudivisa.com/) where I touched on leveraging cryptography on malware for stealthy communication, and after the release of [MD MZ Book 2nd edition](/book/2024/11/29/mybook-2.html), I will decide to continue research cryptography in malware development. This post is the result of my own research on using Treyfer on malware development. As usual, exploring various crypto algorithms, I decided to check what would happen if we apply this to encrypt/decrypt the payload.