Tagged articles
4 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama

At dawn a sharp alarm reveals a malicious C2 connection in the Linux empire, prompting a frantic hunt through hidden processes, missing logs, and a secret traffic‑analysis system that uncovers a Log4Shell JNDI exploit launched via port 36560, ultimately exposing mis‑configured ElasticSearch and prompting emergency patches.

JNDILog4Shelllog4j
0 likes · 7 min read
How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama
Top Architect
Top Architect
Nov 6, 2020 · Information Security

Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion

The report investigates the malicious “Le Bao” application that mimics WeChat, detailing its hidden QR‑code group‑joining mechanism, server‑side communication, payment and gambling integration, and the broader illicit promotion and profit model, while providing forensic traces, source‑code decoding, and mitigation recommendations.

Mobile Securityapp spoofinginformation security
0 likes · 13 min read
Security Analysis of the “Le Bao” Fake WeChat App Used for Pornographic Promotion
Architecture Digest
Architecture Digest
May 1, 2017 · Information Security

Overview and Architecture of the Xplico Network Forensics Tool

Xplico is an open‑source network forensics platform that reconstructs application‑level data from captured traffic, supporting numerous protocols, offering modular decoding, multithreaded processing, and flexible output to databases or files, making it valuable for security analysis and incident response.

Packet CaptureXplicoinformation security
0 likes · 9 min read
Overview and Architecture of the Xplico Network Forensics Tool