Silence is harder to predict than the noise ×_×

As a person possessive of my beloved operating system, I’ve often wondered if it is being honest with me or hiding stuff that matters (anything that could break my heart). Well, I thought it was a bad liar until the day I came across the world of rootkits. So, here is an article that intends to shed some light into the dark world of rootkits by demonstrating the whole process of injection and execution of malware on behalf of a process. The idea of code injection discussed here is known as…


Knowledge is power but what good or evil may come ahead solely depends upon an intention ×_×

Unlike the previous article series on Malware engineering (where we focused on disk-based infection strategies on Linux platforms), from now on we plan our intentions considering memory as a playground. If done right, it could provide far better stealth than disk-based infections. This is an introductory article in this series which doesn’t focus on any particular technique used by malware rather it serves as a foundational base that should be able to get you started with malware research independently. …


Damn daemons sent to sleep yet the darkness danced in freedom ×_×

While you were reading this line, the actual virus body is chilling out at some corner of the host binary in the form of a parasite, waiting to take over the code execution of the innocent program. Till now we’ve implemented the algorithm to find a home for the virus body inside an innocent host binary but what evil/good is supposed to be done once we hijack the code execution (of host process) is decided by the parasite code (the injected code that makes itself as home inside…


A virus is a small infectious agent that replicates only inside the living cells of an organism ×_×

That’s how Wikipedia defines a biological virus in a nutshell. Holding on the analogy, a computer virus comes under the category of a malware that infects host binaries (even memory) via some parasitic code injection technique. Parasite here is the code that gets injected, residing in the host binary to takeover the hijacked code flow of the host program. After infection, the host binary is trojanized to achieve further goals. Trojan is a software that has malicious intent but disguise to be…


Magic is nothing more than a logic running beyond the imagination of its audience ×_×

Since the day I got to hear about the term computer virus, I was curious to know what it exactly is or how is it created but the internet was filled with much of the random and superficial stuff about malware that it was hard to extract any useful information. Some months ago, I started with a simple file system crawler on Linux which ended up into an infector program - Kaal Bhairav (perhaps not a virus itself but capable of generating a few of…


Hacking has always been a superficial concept in the mind of every beginner and in general anyone outside the infosec (information security) community. Since this is my first article in the domain of cybersecurity, I’ll try to keep things simple and introductory about what hacking really means and a slight introduction to the binary hacking which is one among many other domains in the world of information security.

Expected Audience — Absolute Beginners !

What the heck is a hack ?

Hacking is interacting with something to identify its weakness and then taking advantage of that weakness to make it do things it is not intended to…

Abhinav Thakur

software security researcher

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store