If cyber threats had a most-wanted list, Chip would be the detective cracking the case! My blog dives deep into the world of cyber intelligence, unraveling attacks, trends, and security tactics with a mix of wit and wisdom. Whether you’re a seasoned pro or just cyber-curious, expect insights that pack a punch—no fluff, just the good stuff!
-
CIF – Collective Intelligence Framework – My deployment
Morning Everybody!!!! Been working on crafting my skills in Threat Intelligence and available open source system. As the title says I have been working on CIF from CSIRT and wanted to share my experience and my personal future developments. Following are few screenshots of the system : CIF comes with… Read More ⇢
-
Malware Analysis – Mind Map
Its been long time have updated my blog. Just busy @work and with family and trying to juggle a lot. Have been working a mind maps and this is the first one. Malware Analysis is something I like and interested in. I will creating other mind-maps. Mind-maps are also available… Read More ⇢
-
Dridex malware dropper -New doc 115.doc
On a pleasant morning I received an email with an doc attachment. The email was not having any text or message. Subject was name of the attachment ‘New Doc 115’. It was my curious mind (place where the cat gets kills inevitably) that I decided to analyse it. The email actually… Read More ⇢
-
Ho Ho Ho – Here comes the spam/phish
Merry Christmas and Happy New Year to all ! I thought to start the new year with a blog with regards to spam from Australian Giants – Woolworths, JB HiFi, Flight Centre, Bunnings etc. Although, we are on holidays, attackers/hackers are not. Holiday time is in fact very good time… Read More ⇢
-
Heap Spray attempts : Compromised site http://www.efendim.net
On a Saturday evening I spent some time in upgrading my MacBook Pro with an SSD. The only SSD I had was having security Onion built on it. So I fired up the best NSM OS and tested. Is that during the test I found a compromised site – http://www.efendim.net. My SQUIL… Read More ⇢
-
Information Gathering – Then, Now and Why ?
Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several names – Reconnaissance, Intelligence assessment, surveillance etc. The better an attacker/analyst is in information gathering with regards to the target the better he/she can exploit… Read More ⇢
-
Installing/running TOR on Linux distros
TOR – The onion routing – famous for anonymity. TOR browser gives user an edge to be anonymous while browsing. Installing TOR on windows box is easy but in linux especially as root user there are some issues. Following errors I faced to execute or open TOR browser : 1.… Read More ⇢
-
A interesting email – FROM field empty
Received a interesting email yesterday from Mr. Gordon Hills from London who wanted me to be partner and 5 Million dollars will be released to me. Sometimes does feel like someone should give me money 🙂 The email seems to be a template and this could be a broadcast on… Read More ⇢
-
Comand line use to check IP reputation
Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and script that does the task. However, I always used command line to identify whether a IP address is blacklisted on any blacklist. The reason is… Read More ⇢


