Jump to content

michael.jenkin

Atømican
  • Content Count

    873
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by michael.jenkin

  1. michael.jenkin

    When is an Image file not an Image file ? (Another security Video)

    followup to yesterdays video, pulling apart a Dotnet exe file
  2. I thought that this might be of interest. Gets into a deep dive but if this information is not shared out there, none of us will be prepared ! https://youtu.be/uUelJ-E2ZwE
  3. michael.jenkin

    Anatomy of a website hack

    Anatomy of a website hack, follow me on another "journey" https://youtu.be/Q2VO9XsJJxc
  4. michael.jenkin

    Video on fileless malware (Semi Fileless)

    Fliptopia ! Sounds like we travel in similar circles. turns out that Jumper is a modification of the Jamper Ransomware. they normally use Process Hacker to kill your AV.
  5. Ever wondered how a Microsoft Help CHM file could be dangerous ?
  6. michael.jenkin

    Extracting and viewing bundled malware in EXE file

    Thanks fliptopia ! A good reply. No, I never checked out that website. I might if I get bored but I am more about passing along the information about how to avoid getting caught by these sites
  7. another post in my series about pulling apart and dealing with Malware. If you like my series and have any ideas of more subjects / topics I would love to hear about the ideas !! As always, these videos are my community effort to help people like yourself, knock malware on it's head !
  8. michael.jenkin

    Pulling apart APK files

    https://youtu.be/UwFXndJH_34 I thought I would share this video I created where I pull apart an APK file looking for malware :)
  9. I am often asked, how to I find out what an EXE is doing. As if we need another Ghidra Video Pulling apart Executables with Ghidra Disassembler !
  10. michael.jenkin

    Mickyj Whitehat foundation videos

    Hello, Since starting the Mickyj Whitehat series, I have had a lot of questions about the tools I use. I decided to create a sub series based on the basic tools I use. I called it Foundation as it is the Foundation knowledge needed to follow some of the videos in the other series. Some of these tools can be used standalone and many of you may have used them. Here I try and show you how to get the best out of them. I kick it off with "Virustotal" and "Hybrid-analysis" online virus analysis tool and sandbox. If you want to see how I use these tools, take a look at the foundation series. If you like where this is headed, I would love your support. Please subscribe !
  11. michael.jenkin

    What the heck is IDA? Ghidra? Take a look. - Mickyj Whitehat

    Yes, IDA was awesome but now ... a little old. As long as this tool from the NSA is on the level, then suddenly everyone has access to make an even better tool
  12. The NSA released their reverse engineering tool to the public, called Ghidra. It has been treated with a lot of suspicion. I downloaded it and gave it a quick once over. Has anyone else here played with it ?
  13. michael.jenkin

    New YouTube series: Mickyj Whitehat

    wow, freaking out when I opened word, that would have made me jump ! Thanks guys for subs. I know the content is not for everyone however, there are a few things it does. -It shows people the tools that can be used. -It shows people that at the end of the day, these viruses are just badly written code. -It means others, if they have the interest, can dive in and figure it out -We all learn better security practices. Not everyone cares to see the code but when they do, they comment, "That's it?". It breaks that mysterious boundary and people suddenly understand a hidden world. Thanks again for joining me and spreading the word.
  14. michael.jenkin

    New YouTube series: Mickyj Whitehat

    Hey everyone, It has been a long time since I frequented Atomic. Lot's has happened in life. some good, some bad. Recently I decided to try and make a dent in the world of Malware and share what I know. I started a YouTube series called Mickyj Whitehat. I am sharing the tools I use to find, remove and kill malware. I thought it might come in useful for training other IT pro's on what to do. Then I thought, people here might also like to take a peek. I only have a small subscriber base and to make the channel effective, I want to get some exposure. The channel is not monitised so I am not earning big bucks from it. It is simply me doing my bit for the community. So I would appreciate, if the information is of interest to you, that you subscribe or share the link around. I am a tech, not a sales person so I am not great at "selling myself" but I figure this info speaks for itself. The Channel has other stuff on it (https://www.youtube.com/michaeljenkin) and the playlist for the Malware stuff is https://www.youtube.com/watch?v=i17_ZtvAk9g&list=PLodEQVE4Lw01mtCM_LAn6e0tPNd5BfERv . I am a true geek and shyly hiding behind my keyboard but I have learnt to have a YouTube personality (loud and in your face) so I know some people I know form this forum may be a little shocked :) So, if you subscribe what's in it for you ? I can keep you up to date with teardowns on VBS, js, exe, scr, hta, powershell and more malware. I can satisfy that urge to know how something works. I can pull apart the latest ransomware for you. If you get something you want documented and pulled apart for the world to see, I would love to see it. I hope that this post does not violate any of the terms and conditions that I just accepted (again). It is not my intention however mods, feel free to remove if I have. thanks all, have a great day !
  15. A new flavour of Cryptolocker came out 29/5/2014. It locks down the victims files and the person in charge wants $1000 USD to give the files back. I know that everyone here is cautious and suspicious of emails, attachments and links. Think about your friends and family whom are not so savvy. Do yourself and them and bring them up to speed about the dangers of the internet. Here is the latest information I have gathered http://blogs.msmvps.com/mickyj/blog/2014/0...w-and-improved/ Something a little more formal that I wrote on the original version http://www.crn.com.au/Feature/364753,uncra...yptolocker.aspx Here is a link to a Cryptolocker prevention kit http://msmvps.com/blogs/bradley/archive/20...ention-kit.aspx be safe out there !
  16. michael.jenkin

    michael.jenkin Photos

    I thought it was time I joined the crowd and started posting some of my photos. I thought this might also be a nice place to put a kind of "Photo Bio". In this way you can see what I am all about without waiting for me to reply to a comment. Firstly, I am a Canon man. I am addicted to cameras and associated gadgets. I can't get enough. I also like to experiment and have tried everything from Holga, Pinhole, IR through to Reflex lenses and modifying cameras with external circuits. I upload my good/ok photos to http://www.flickr.com/photos/mickyj_photos and the bad photos ... I pretend I never took them :) I also have a digitalRev profile here http://www.digitalrev.com/mickyj and visit http://www.ausphotography.net.au/ occasionally. I annually enter the Canon EOS Photo5 and have had a few images published. Here is one of my favorites. http://www.flickr.com/photos/mickyj_photos/3968327035/
  17. michael.jenkin

    michael.jenkin Photos

    I have been flat out working... not posting photos. missed you guys. I have however been perfecting my light painting orb spinning rig and firewool spinning technique. So here are some links to what I am up to and some images http://blogs.msmvps.com/mickyj/blog/2015/06/14/light-painting-with-orbs-and-firewool-spinning/ https://www.youtube.com/watch?v=e9xhhs5qg6w
  18. michael.jenkin

    Toshiba Flashair

    Hello, Recently I bought a Toshiba FlashAir SDcard. Combined with my CF to SD adaptor and some software called Snowy, I now have my camera SD card contents copied automatically to my laptop via Wifi. I have turned my Canon EOS into a Wireless camera. The video, Raw and jpg files are all copied accross. I started doing some digging and found out that there are no actual Australian Distributers for this item. I made contact with the overseas supplier whom has asked if I would like to be a distributer. I like the product so much (32gb, Class 10 with non obtrusive wifi easy to setup, fast, works in more than just cameras, supports wireless n - What's not to love?) http://www.toshiba-components.com/prpdf/6431E.pdf http://www.toshiba-components.com/FlashAir/ Whilst I know that there are competing products out there that do a similar job (this supplier also does the Flucards) this one just seems more polished. The issue is, I need to order a large quantity of these upfront to be a distributer. I want to be sure that there is a market out there else, I will have these sitting around for a while. Are you guys interested ? Especially if I give discounts to Atomic Forum posters? - :) There are a few other forums I will pose this question in as I want to see what the real market is saying. My aim would be to have local stock, sort out any warranty issues locally and give local (english) support and hopefully good prices. Thanks
  19. michael.jenkin

    Smenkhare's Photos

    Nice deep space images. I need to get my scope out. I think you just motivated me :)
  20. michael.jenkin

    michael.jenkin Photos

    Thankfully I have used my camera and lens elsewhere and can't see any problems. no obvious dust on the body or lens. None when looking through the glass. I did stand with the wind coming from behind and was a distance from the dust. I would be more cautious next time :) (or not do this event at all). There would be loads of camera phones that are now stuffed:) Yes, I shot in Raw. thanks for the idea, and feedback.
  21. michael.jenkin

    michael.jenkin Photos

    Then I see this post .... http://www.lensrentals.com/blog/2013/05/how-to-ruin-your-gear-in-5-minutes-without-water#more-13806 hmmmm
  22. michael.jenkin

    michael.jenkin Photos

    Thanks. I have to agree about the kid being cropped out. On the day, it was really hard to keep clean and also avoid all the other people blocking the shot. It was a really busy day. Here is another of the same people but not as appealing.
×