diff --git a/_posts/2024-12-16-malware-cryptography-36.markdown b/_posts/2024-12-16-malware-cryptography-36.markdown index 88d346d..46f1eb4 100644 --- a/_posts/2024-12-16-malware-cryptography-36.markdown +++ b/_posts/2024-12-16-malware-cryptography-36.markdown @@ -2,7 +2,7 @@ title: "Malware and cryptography 36 - random sbox generation algorithms: Fisher-Yates shuffle. Simple C example." date: 2024-12-16 02:00:00 +0200 header: - teaser: "/assets/images/141/2024-12-16_18-16.png" + teaser: "/assets/images/141/2024-12-17_12-13.png" categories: - malware tags: @@ -18,7 +18,7 @@ tags: Hello, cybersecurity enthusiasts and white hackers! -![cryptography](/assets/images/141/2024-12-16_18-16.png){:class="img-responsive"} +![cryptography](/assets/images/141/2024-12-17_12-13.png){:class="img-responsive"} After reading some of my posts about cryptography, for example [this](/malware/2024/07/21/malware-cryptography-30.html) or [this](/malware/2022/08/16/malware-av-evasion-9.html), my readers had questions regarding the concepts of `sbox` generation, so I will decide to continue research cryptography in malware development, and I want to shed light on one of these tricks for generating random sboxes. @@ -697,7 +697,7 @@ Uncomment WinAPI functions, compile for run payload: x86_64-w64-mingw32-g++ hack4.c -o hack4.exe -I/usr/share/mingw-w64/include/ -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc -fpermissive ``` -![cryptography](/assets/images/141/2024-12-17_12-13.png){:class="img-responsive"} +![cryptography](/assets/images/141/2024-12-17_12-17.png){:class="img-responsive"} As you can see, everything is worked perfectly! =^..^= diff --git a/assets/images/141/2024-12-17_12-17.png b/assets/images/141/2024-12-17_12-17.png new file mode 100644 index 0000000..4da8157 Binary files /dev/null and b/assets/images/141/2024-12-17_12-17.png differ