Simple AES Encryption + Signature Simple AES encryption, where the IV, key, and mode are directly written on the frontend, is the easiest approach. You can export the mini-program source code using the tools mentioned above and easily open and search using vscode. Both Yakit's hot-loading function o...
Nov 2, 20254 min read
Case Analysis of Encryption and Decryption Data Packets: Practical Implementation of AES Encryption and Signature Verification (Part 1)
7 min read
NPM Software Supply Chain Security Incident
Preface In the past two days, the NPM registry has once again suffered a serious supply chain attack. This incident appears very similar in nature to the previous LedgerHQ library compromise — its main goal was also to steal cryptocurrency. Although this attack ultimately failed to steal any funds, ...
4 min read
Shortcut to Trouble: Analyzing a Trojan That Deploys Cobalt Strike
1. Sample Overview This is a typical compressed package phishing Trojan. It uses a shortcut file to deceive the victim, luring them into clicking it. Once executed, the malicious code runs and eventually loads a Cobalt Strike beacon through reflective loading. 2. Sample Analysis 2.1 Basic Informatio...
6 min read
Gaining Access to the Production Network via AnyDesk in a Domain Environment
External Perimeter Breach After identifying the target, the initial step was to perform information gathering using integrated tools. Solutions like Goby—which combine port scanning, fingerprint recognition, directory scanning, and vulnerability scanning—are usually effective. However, in this case,...
4 min read
Universal Exploitation Vulnerability Caused by js.map File Exposure
I. Introduction A .js.map file is a JavaScript Source Map file. It stores the mapping between compressed/minified code and the original source code. Its main purpose is to help developers debug by restoring compressed code into a readable form, making it easier to locate issues quickly.