Arti Karahoda

Cyber Security & Data Protection

Blog Feed

1. Technical Articles

Evading AV with Network Sockets / Keylogger RAT

August 31, 2020 — Compiling and running an unsigned Windows executable and expecting a remote CMD session without any detection is a difficult task to achieve, however, sometimes there are easier ways of bypassing AVs. This article will outline a simple but functional remote ‘shell’ with keylogging capabilities against a fully up-to-date Windows Defender.

Weevely Backdoor Analysis / Blue Team DFIR

March 30, 2020 — Weevely is a powerful polymorphic backdoor used in web post-explotation; this tool is written in Python and it generates a small obfuscated PHP shell which is then delievered to the targeted web server. The article will lay out it’s communication chain and encryption scheme in order to assist blue team operators during a DFIR process.

Building Android Spyware / Xombie APK

December 26, 2019 — Xombie APK is an Android spyware which works with the latest SDK version (API level 29). This research post will outline some functionalities that can be used for such purposes and for educational use only. The application is part of a larger project—SMS Xombie—which makes use of the GSM network to command and control infected devices.

Ethereum RPC & IPFS / HTB Chainsaw

November 23, 2019 — This article will demonstrate a new vector of attack using Blockchain tools, commencing from an initial CMD injection through Ethereum’s RPC interface, SSH keys retrieval using the IPFS protocol, privilege escalation by stealing funds from a smart contract, and file system forensics in the slack space storage.

2. Sense Cyber Research Center

Cybersecurity Awareness Month #BeCyberSmart
October 31, 2020 — This article is part of #NCSAM20 to help protect entities from online fraud and malware. It outlines key cyber-threats and their respective counter-measures in terms of safety tips – relevant to both individuals and businesses during the COVID-19 era.

A Look Inside Banka Ekonomike’s Data Breach
May 1, 2020 — A comprehensive overview of the data breach incident at Banka Ekonomike in Kosovo by the DoppelPaymer ransomware. What information has been compromised, who is the entity behind the cyber-attack, and what are the key corporate security lessons?

Data Protection in Kosovo
August 1, 2019 — A general outline on how Privacy & Data Protection are defined in Kosovo as well as data protection legislation throughout the years, key legal points, and the supervistory authority along its top court cases.

3. Capture the Flag Documentations

$ whoami

About me: I am a Cybersecurity Specialist—from Prishtina, Kosovo—working in the field of Information Security and Data Protection. I completed my studies in Computer Engineering, Computer Networks, and Cyber Security. My key technical skills lie in enterprise security, network and mobile security, digital forensics, malware development and process automation using Python & C/C++.

Capture the Flag: I occasionally partake in CTF global events with a main focus on web, cryptography and steganography.

Hack the Box: HTB is an online penetration testing platform with more than 400,000 Security Researchers worldwide. My peak rank was the fourth (4th) position globally as seen below.

Team: Cyclone (Best rank: #2 out of 1931)



You can support my work through – thank you!