Open in app
Home
Notifications
Lists
Stories

Write
Thomas Roccia
Thomas Roccia

Home
About

Published in SecurityBreak

·Pinned

Security Infographics

I often do infographics to share security concepts or best practices. This page will list the different files. I will update it periodically so stay tuned by following me on Twitter or Medium. If you like these infographics and would like to have a printed version for your office or…

Cybersecurtiy

3 min read

Security infographics
Security infographics

Published in SecurityBreak

·May 10

External References

This page is used to keep a track of my external work, including blogs, research, conferences, and media interview. Research Blogs Title: 5 Critical Components to Include in Your Next Threat Intel Brief Date: March, 2022 URL: 5 Critical Components to Include in Your Next Threat Intel Brief (feedly.com) Title: Operation ‘Harvest’…

Cybersecurity

4 min read

External References
External References

Published in SecurityBreak

·Mar 15

[Reverse Engineering Tips] — Unpacking InnoSetup

To deliver an application, developers can use Windows installers. Windows installers are software components used for installing, maintaining, and removing a program. Windows installer can be used:​ To bundle a software with dependency dll or other software, To add additional commands during the installation process,​ Load specific configuration required by…

Malware Analysis

3 min read

[Reverse Engineering Tips] — Unpacking InnoSetup
[Reverse Engineering Tips] — Unpacking InnoSetup

Published in SecurityBreak

·Feb 21

My Top Books to Learn Malware Analysis and Reverse Engineering

I often get messages from people wanting to learn more about reverse engineering and malware. I always refer to the same books and I though it might be a good idea to share my best selection in this blog so that I can easily link to this page. I mostly…

Malware Analysis

6 min read

My Top Books to Learn Malware Analysis and Reverse Engineering
My Top Books to Learn Malware Analysis and Reverse Engineering

Published in SecurityBreak

·Dec 21, 2021

Log4Shell Visualization

The Log4Shell (CVE-2021–44228) is a zero-day vulnerability in Log4j a Java logging framework, which has been released in December 2021. This vulnerability allows a remote code execution. It is estimated that the exploit affects hundreds of millions of devices and is quite simple to execute. The vulnerability takes advantage of…

Log 4 Shell

2 min read

Log4Shell Visualization
Log4Shell Visualization

Published in SecurityBreak

·Dec 10, 2021

[Reverse Engineering Tips] — Extracting MSU file

To understand a vulnerability, it is sometimes useful to study the patch and compare it to see what has changed. On the Windows environment, patches are distributed through the update process in a Microsoft Standalone Update (MSU) file. In this RE tips, we are going to see how we can…

Reverse Engineering

2 min read

[Reverse Engineering Tips] — Extracting MSU file
[Reverse Engineering Tips] — Extracting MSU file

Published in SecurityBreak

·Nov 26, 2021

3D Printing Industrial Control System Simulation

This article is a repost from the McAfee website. I wrote this during my time at McAfee Labs in the Advanced Threat Research team. It is an industrial simulation with Modbus and a 3D printed industrial system. The original paper can be downloaded here: Industrial Control System (ICS) Simulation (mcafee.com).

Makerlab

8 min read

3D Printing Industrial Control System Simulation
3D Printing Industrial Control System Simulation

Published in SecurityBreak

·Nov 25, 2021

[Reverse Engineering Tips] — Enumerators

When doing reverse engineering, it is important to understand the data structures that can be used by a program. Being able to reconstruct these data structures during disassembling will be very useful during your analysis and improve the understanding of the program. In this RE tips, I will explain a…

Reverse Engineering

4 min read

[Reverse Engineering Tips] — Enumerators
[Reverse Engineering Tips] — Enumerators

Published in SecurityBreak

·Jul 16, 2021

Security Highlight #4

The past weeks have been very busy with the critical vulnerability PrintNigthmare and the REvil attack which breached Kaseya MSP. A lot of content have already been published and discussed. In this Security Highlight expect content not related to these two, but information that you may have missed. Here is…

Newsletter

4 min read

Security Highlight #4
Security Highlight #4

Published in SecurityBreak

·Jul 2, 2021

Security Highlight #3

Already summertime and I know that some of you are experiencing hot weather in some parts of the planet! Here is Security Highlight number 3: your fresh news condensed to stay up to date in just 3 minutes! Enjoy reading! If you want to stay up to date on future…

Newsletter

5 min read

Security Highlight #3
Security Highlight #3
Thomas Roccia

Thomas Roccia

Security Researcher

Following
  • Rebecca Vickery

    Rebecca Vickery

  • @cryptax

    @cryptax

  • Thomas Ricouard

    Thomas Ricouard

  • Bank Security

    Bank Security

  • Kevin Beaumont

    Kevin Beaumont

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable