Batchography: Embedding an executable file in a Batch script

batchography-good-resIn this blog post, I am going to share with you a recipe from the Batchography book that illustrates and explains in details how to embed executable files in the Batch file script and execute them after they are dropped.

This technique does not rely on using a polyglot Batch file where its first part is actually a Batch script and the other part is a VBS or JScript script. If you want to learn more about how to write polyglot Batch scripts, please refer to Chapter 4 in the Batchography book.

flower separator

Get the book from Amazon: the print editionbtn-buy-on-amazonor the e-book editionbtn-buy-on-amazon

flower separator

Continue reading

How to check who logged in and when via Windows Remote Desktop

Hello,

Remote Deskop is a nice facility built-in Microsoft Windows from XP and up.

You can use it to remotely administer your computer or simply do programming work.

Many times you may want to keep track and see who is logging into your PC for security reasons. This article will show you how. Let’s proceed!

rdp-cover Continue reading

How to capture and analyze HTTP/HTTPS from your smartphone or tablet using Fiddler

Hello,

In the previous article, I showed you how to capture traffic from WiFi devices. In this article, I will illustrate how to capture HTTP/HTTPS traffic using Fiddler.

This skill is very useful for web programmers or security engineers who want to debug their application or audit third party applications that use web services over an encrypted channel. Let’s get started! Continue reading

How to capture all network traffic going through your smartphone/tablet/laptop or other wireless devices

Hello,

In this blog post, I am going to show you how to record all inbound and outbound network traffic from a wireless device (smartphone, tablet, laptop, etc…).

People desire to capture traffic for many reasons, namely for/by:

  • Security Auditing and penetration testing
  • Programmers and testers
  • Application protocol analysis and recovery
  • etc…

Let’s get started! Continue reading