<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Breaking into CyberSec]]></title><description><![CDATA[In this blog, I will document my learning and experience in cybersecurity. Follow along on my journey from learner to expert.]]></description><link>https://maxwellcybersec.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1745075038482/67d78c10-c8a4-4f1d-8b32-fc11599dd953.png</url><title>Breaking into CyberSec</title><link>https://maxwellcybersec.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 01:10:08 GMT</lastBuildDate><atom:link href="https://maxwellcybersec.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Chapter 1]]></title><description><![CDATA[Basic Static Analysis
Antivirus scanning

A good first step is to run the malware through multiple antivirus programs.

Malware authors can easily bypass antivirus databases by simply changing their code to change the malware signature to one the ant...]]></description><link>https://maxwellcybersec.com/chapter-1</link><guid isPermaLink="true">https://maxwellcybersec.com/chapter-1</guid><dc:creator><![CDATA[Elijah Maxwell]]></dc:creator><pubDate>Mon, 19 May 2025 02:36:54 GMT</pubDate><content:encoded><![CDATA[<h2 id="heading-basic-static-analysis">Basic Static Analysis</h2>
<h4 id="heading-antivirus-scanning">Antivirus scanning</h4>
<ul>
<li><p>A good first step is to run the malware through multiple antivirus programs.</p>
</li>
<li><p>Malware authors can easily bypass antivirus databases by simply changing their code to change the malware signature to one the antivirus cannot detect.</p>
</li>
<li><p>A helpful site is <a target="_blank" href="https://www.virustotal.com">VirusTotal.com</a>. This site uses multiple antivirus engines to generate a report that provides the total number of engines that marked the file as malicious, malware name, and additional info on the malware if available.</p>
</li>
<li><p>Rare malware often goes undetected, simply because it is not in an antivirus database.</p>
</li>
</ul>
<hr />
<h4 id="heading-hashing">Hashing</h4>
<ul>
<li><p>Hashing is a common method used to uniquely identify malware.</p>
</li>
<li><p>The MD5 hash function is most commonly used, but SHA-1 is also popular.</p>
</li>
<li><p>If you go to <a target="_blank" href="https://www.winmd5.com/">winmd5.com</a>, you can install a lightweight MD5 hash calculator that will instantly calculate the hash of a given file.</p>
</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1747621781994/3e56fc83-5aa8-41be-bfa5-1b3ee66b07dd.png" alt /></p>
<p>Here is the winMD5 program that I had calculate a hash for discord</p>
<ul>
<li>With this hash, you can use it as a label, share it with other analyst, or search for the hash online to see if it has already been identified as malicious.</li>
</ul>
<hr />
<h4 id="heading-finding-strings">Finding Strings</h4>
<ul>
<li><p>You can install the <a target="_blank" href="https://learn.microsoft.com/en-us/sysinternals/downloads/strings">strings</a> program, and this will allow you to search an executable for strings.</p>
</li>
<li><p>Strings are typically stored in ASCII or Unicode format. I found this <a target="_blank" href="https://www.ascii-code.com/">site</a> that has a chart that maps ASCII characters to their corresponding decimal, hex, and binary values.</p>
</li>
<li><p>Sometimes the strings program will not detect actual strings, but rather a random sequence of numbers and letters that is typically meaningless; it may just be a memory address or something of the like.</p>
</li>
<li><p>Some meaningful things that the strings program could pull are windows function names, a .DLL file type, an error message, or even IP addresses.</p>
</li>
<li><p>Analyzing these clues in strings is like solving a puzzle and is an important part of malware analysis.</p>
</li>
<li><p>Be aware that malware often uses legitimate libraries like DLLs to further its goals.</p>
</li>
</ul>
<hr />
<h4 id="heading-packed-and-obfuscated-malware">Packed and Obfuscated Malware</h4>
<ul>
<li><p>Obfuscated=Malware author is trying to hide the execution of the program.</p>
</li>
<li><p>Packed=Subset of obfuscated programs in which it is compressed and cannot be analyzed.</p>
</li>
<li><p>Legit programs usually have lots of strings, where as packed or obfuscated malware will contain very few strings. This is an easy sign that you may be dealing with malware.</p>
</li>
<li><p>If the program is packed or obfuscated, static analysis will not be enough.</p>
</li>
<li><p>You must unpack a program to perform static analysis!</p>
</li>
<li><p>You can detect packed files with a program called <a target="_blank" href="https://github.com/wolfram77web/app-peid">PEiD</a>. This will detect the type of packer or compiler used on the file.</p>
</li>
</ul>
<hr />
<h4 id="heading-dependency-walker-and-dlls">Dependency Walker and DLLs</h4>
<ul>
<li><p><a target="_blank" href="https://www.dependencywalker.com/">Dependency walker</a> is a program that list the dynamically linked functions in an executable.</p>
</li>
<li><p>This is useful because when we are able to see the functions used in a program, we can speculate what the program is doing.</p>
</li>
<li><p>A programs DLLs can tell you a lot about it's functionality.</p>
</li>
<li><p>Windows functions that contain the Ex suffix, like CreateWindowEx, just means that it is the updated version of the function, but windows still supports the old one.</p>
</li>
<li><p>Dependency walker will also show a list of all exported functions, which can be useful as well, but malware authors typically write confusing names for exported functions, and can be hard to understand what they do. On the bright side, exported functions are not very common.</p>
</li>
<li><p>The PE file header will include information on functions used by the program, giving us good insight into what the program does.</p>
</li>
</ul>
<hr />
<h4 id="heading-examining-pe-files">Examining PE files</h4>
<ul>
<li><a target="_blank" href="https://github.com/cybertechniques/site/blob/master/analysis_tools/peview/index.md">PEview</a> is a tool that can browse information on a PE file header and sections. See example below.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1747621881888/04df5446-89a8-4294-9c7e-b907e0bde01b.png" alt /></p>
<ul>
<li>The time date stamp gives us information on when the program was compiled, which is helpful because if it is an old compile then antivirus programs may have signatures for it, but if the compile time is very recent, then there may not be signatures for it.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1747621901541/dfa657e4-e52b-4324-8247-c885b87af224.png" alt /></p>
<ul>
<li><p>Virtual Size is the amount of space that is allocated for that section in memory.</p>
</li>
<li><p>Size of raw data shows how big the section is on the disk.</p>
</li>
<li><p>If the virtual size is much greater than size of raw data in the code section, then the program is likely packed.</p>
</li>
</ul>
<h5 id="heading-viewing-the-resource-section">Viewing the resource section</h5>
<ul>
<li>Using a free tool called <a target="_blank" href="https://www.angusj.com/">Resource Hacker</a>, we can examine the .rsrc (resources) section of a file.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1747622010195/3e92d811-6267-4251-b464-61b07a251fe9.png" alt /></p>
<ul>
<li><p>This tool gives a lot of useful information on the resources that a given program uses, which is very useful for static analysis.</p>
</li>
<li><p>The menu section for example, shows the names of all the menus used in the program as well as the text used in each. The menu names should give a good idea of their functionality.</p>
</li>
<li><p>As shown above, the dialogue section shows what the user would see, and opens a preview window of the actual program. If we knew nothing else about this program, we could infer what it does by simply viewing the dialogue section.</p>
</li>
<li><p>Another useful thing to know is that programs or drivers are often imbedded in the resource section in order to hide them.</p>
</li>
<li><p>This tool allows us to extract these imbedded programs/drivers for individual analysis.</p>
</li>
</ul>
<h5 id="heading-pe-header-summary">PE Header Summary</h5>
<ul>
<li>Here is a helpful chart from <em>Practical Malware Analysis By Michael Sikorski and Andrew Honig</em> that depicts helpful information that is revealed by the PE file header.</li>
</ul>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1747622017933/a1f9442f-bd0b-4a5f-88c3-0a688b918c86.jpeg" alt /></p>
<hr />
<h4 id="heading-miscellaneous-notes">Miscellaneous notes</h4>
<ul>
<li><p>The function <em>SetWindowsHookEx</em> is commonly used in spyware and is the most popular way that keyloggers get keyboard inputs.</p>
</li>
<li><p>The registry key <em>Software\Microsoft\Windows\CurrentVersion\Run</em> is common in malware and it controls which programs are automatically run when windows starts up.</p>
</li>
<li><p>The PE file header contains helpful metadata on the file itself.</p>
</li>
<li><p>Static analysis is typically only the first step, and further analysis such as dynamic analysis is usually necessary.</p>
</li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Diving into Practical Malware Analysis]]></title><description><![CDATA[Any Software that causes detriment to the user is considered malware.
I learned that the purpose of malware analysis is typically to provide information needed to respond to a network intrusion. It is described as a game of cat and mouse, like solvin...]]></description><link>https://maxwellcybersec.com/diving-into-practical-malware-analysis</link><guid isPermaLink="true">https://maxwellcybersec.com/diving-into-practical-malware-analysis</guid><dc:creator><![CDATA[Elijah Maxwell]]></dc:creator><pubDate>Sun, 11 May 2025 20:11:09 GMT</pubDate><content:encoded><![CDATA[<p>Any Software that causes detriment to the user is considered malware.</p>
<p>I learned that the purpose of malware analysis is typically to provide information needed to respond to a network intrusion. It is described as a game of cat and mouse, like solving a puzzle. This really interests me because I love understanding how things work and why, and solving problems, especially ones that can lead to impactful solutions.</p>
<p>Another interesting thing is that malware analysis can be used to create host-based and network-based signatures and help prevent any future intrusions, thus making an organization’s security posture stronger.</p>
<p>Malware indicators focus on what the malware does to a system, not on the characteristics of the malware itself, so that malware that changes its form can be detected.</p>
<p>Network signatures can be created without Malware Analysis, but signatures created with the help of malware analysis are far more effective.</p>
<p>There are two main approaches to malware analysis: Static and Dynamic. Static analysis involves examining the malware and its contents without running it, while dynamic analysis involves actually running the malware in a sandboxed environment and examining its behavior.</p>
<p>I have realized that malware analysis is essential to having a strong security posture in an organization.</p>
<p>A big reason I am attracted to this niche of cybersecurity is that it is a very sought-after and in-demand skill, yet there are not many people who are skilled in malware analysis and reverse engineering. This inspires me to be one of those few skilled professionals in this very unique and fascinating corner of cybersecurity.</p>
<p>In my current job in the Air Force, I do cybersecurity, but it is a less technical side of cybersecurity where I am an information systems security officer (ISSO). This is one reason why I wanted to pursue the technical side of cybersecurity, so that I can experience both sides. When I become a leader in this field, such as a cybersecurity manager or the like, I want to be able to lead by example and actually have an underlying knowledge of the technical stuff. So that is why i want to understand the technical side of things, and also simply because malware analysis interest me and I have a passion for it.</p>
]]></content:encoded></item><item><title><![CDATA[Starting My Cybersecurity Journey: Why I’m Here and What I’m Building]]></title><description><![CDATA[When I first got into cybersecurity, I didn’t realize how big a topic it was. I realized how big of an umbrella term Cybersecurity is. It isn’t just about hacking or defense; it is about understanding how systems work, how people think, and how small...]]></description><link>https://maxwellcybersec.com/starting-my-cybersecurity-journey-why-im-here-and-what-im-building</link><guid isPermaLink="true">https://maxwellcybersec.com/starting-my-cybersecurity-journey-why-im-here-and-what-im-building</guid><category><![CDATA[#cybersecurity]]></category><dc:creator><![CDATA[Elijah Maxwell]]></dc:creator><pubDate>Sat, 19 Apr 2025 15:42:58 GMT</pubDate><content:encoded><![CDATA[<p>When I first got into cybersecurity, I didn’t realize how big a topic it was. I realized how big of an umbrella term Cybersecurity is. It isn’t just about hacking or defense; it is about understanding how systems work, how people think, and how small missteps can lead to massive vulnerabilities. Over time, what started as curiosity turned into a passion and a career path.</p>
<p>This blog is my way of tracking my journey; what I learn, what I build, and what challenges I run into along the way. It’s not just a portfolio. It’s a living journal that reflects how I grow in this field.</p>
<p>I’m currently active duty in the Air Force working in cybersecurity, and while I’m gaining valuable experience, I also want to begin laying the groundwork for what comes next. I want to pursue more in-depth knowledge in topics that I am interested in, mainly ethical hacking and reverse engineering. I don’t get to deal with these topics at work, so I decided to take things into my own hands. My goal is to break into a federal role or the private sector after my service, ideally with a mission-driven agency like CISA or a Cybersecurity firm, where I can make a real and lasting impact in Cybersecurity. I am also a big advocate for K-12 Cybersecurity education and will get more into that in future articles.</p>
<p>Future posts will cover things like:</p>
<ul>
<li><p>Concepts I’m learning in my cybersecurity degree</p>
</li>
<li><p>Interesting problems I encounter at work</p>
</li>
<li><p>Personal projects and home lab experiments</p>
</li>
<li><p>Thoughts on the evolving cyber threat landscape and current events</p>
</li>
<li><p>Thoughts on Cybersecurity education and awareness, mainly in K-12 schools</p>
</li>
</ul>
<p>Whether you’re someone just starting out, already deep in the industry, or a potential employer looking to see how I think, I hope this blog gives you something worth reading.</p>
<p>Thanks for stopping by. Let’s see where this goes.</p>
]]></content:encoded></item></channel></rss>