FLARE’s FakeNet-NG tool is a powerful network-simulation tool available for Windows and Linux, and the new content-based protocol detection and SSL detection features ensure that FakeNet-NG remains the most useful tool for malware analysts.Read more...
Entries filed under 'Michael Bailey '
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
July 5, 2017 11:00 AM By Michael Bailey | Threat Research
FLARE has brought FakeNet-NG to Linux, allowing analysts to perform basic dynamic analysis either on a single Linux host or using a separate, dedicated machine in the same way as INetSim.Read more...
FLARE Script Series: Querying Dynamic State using the FireEye Labs Query-Oriented Debugger (flare-qdb)January 4, 2017 9:02 AM By Michael Bailey | Threat Research, Advanced Malware
The latest in the script series from the FireEye Labs Advanced Reverse Engineering (FLARE) steps through a command-line utility and Python module for querying and altering dynamic binary state.
March 9, 2016 11:00 AM By Michael Bailey | Exploits, Threat Research
As defensive security controls raise the bar to attack, attackers will employ increasingly sophisticated techniques to complete their mission. Understanding the mechanics and impact of these threats is essential to systematically discover and deflect the coming wave of advanced attacks.Read more...