GeistHaus
log in · sign up

Reverse Engineering a Multi Stage File Format Steganography Chain of the TeamPCP Telnyx Campaign

husseinmuhaisen.com

Walking through the malicious WAV and PNG file formats used by TeamPCP to hide a cred-stealer inside the compromised telnyx Python SDK, from 010 Editor to IDA Free.

0 pages link to this URL

No pages have linked to this URL yet.