@herosi_t Profile picture

Hiroshi Suzuki

@herosi_t

A malware analyst, forensic investigator, incident responder and researcher. A conference speaker and trainer such as Black Hat, Virus Bulletin and FIRST.

Similar User
Teru Yamazaki photo

@4n6ist

Minoru Kobayashi photo

@unkn0wnbit

NAKATSURU You photo

@you0708

Takahiro Haruyama photo

@cci_forensics

Metemcyber photo

@Metemcyber

Masafumi Negishi photo

@MasafumiNegishi

avtokyo photo

@avtokyo

Koichi photo

@x64koichi

_roku_ photo

@00001B1A

MigawariIV photo

@strinsert1Na

Shoko ARAKI photo

@shokoaraki

fatsheep photo

@f47sh33p

Yurika photo

@EurekaBerry

HIROKI IWAI photo

@hiropooh

soji256 photo

@soji256

Pinned

Thanks to YOU, our course at #BHUSA have sold out now! However, don't worry about it. We will add several seats. Stay tuned! @BlackHatEvents blackhat.com/us-19/training…

Tweet Image 1

Hiroshi Suzuki Reposted

#UAC (Unix-like Artifacts Collector) v3.0.0 has been released. Many of my PRs were also merged! Thanks, @tclahr #DFIR #Linux

New #UAC (Unix-like Artifacts Collector) v3.0.0 released! 🌟 New features 🔎 New artifacts 👨‍💻 Thanks to all the contributors!!! Get it here: github.com/tclahr/uac#dfir #digitalforensics #cybersecurity #infosec



GCC 2025 TaiwanでC++マルウェアの解析に関する講義することになりました。 gcc.ac/#reverse-engin… 募集は以下のページでされています。興味のある学生さん、応募お待ちしております。 security-camp.or.jp/event/gcc_taiw…



GCC 2025 TaiwanでC++マルウェアの解析に関する講義することになりました。 gcc.ac/#reverse-engin… 募集は以下のページでされています。興味のある学生さん、応募お待ちしております。 security-camp.or.jp/event/gcc_taiw…


Hiroshi Suzuki Reposted

サイバーセキュリティの世界でトップクラスのカンファレンスBlack Hat USA 2024にIIJの高山が参加しました。高山はIIJチームが提供するトレーニングコースのサポートをしつつ、様々な発表も聴講しています。そのサマリがレポートされています、どれも面白そうです。 eng-blog.iij.ad.jp/archives/27540

Tweet Image 1

Hiroshi Suzuki Reposted

Due to some missing links on the conference web pages, I uploaded my conference talk pdfs for 10 years. Time flies. speakerdeck.com/takahiro_haruy…


Early pricing for our #BHUSA course ends this Friday. To save $300, join our DFIR course now! blackhat.com/us-24/training…

Our #BHUSA DFIR course will attack Win11 23H2 and Server 2022 with in-the-wild malware/attack tools. Then, we will analyze them to discover what evidence the attack tools remain, which means you can learn both attack and defense. Join our course: blackhat.com/us-24/training…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


Our #BHUSA DFIR course will attack Win11 23H2 and Server 2022 with in-the-wild malware/attack tools. Then, we will analyze them to discover what evidence the attack tools remain, which means you can learn both attack and defense. Join our course: blackhat.com/us-24/training…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Hiroshi Suzuki Reposted

Google Chrome Platform Notifications Database analysis with the new @ArsenalRecon LevelDB parser sans.org/blog/google-ch…

Tweet Image 1

Hiroshi Suzuki Reposted

related to this APT case virusbulletin.com/conference/vb2…


Hiroshi Suzuki Reposted

Visual Studio Code (VS Code) used by APT actor as a RAT tool case report. Our research member's presentation material at JSAC2024 is available now. jsac.jpcert.or.jp/archive/2024/p…


I wrote a script to convert Cisco MZIP format firmware into ELF. It might help checking manipulated firmware by attackers. Enjoy! github.com/herosi/mzip2elf


Hiroshi Suzuki Reposted

The tool, result and exploit PoCs github.com/TakahiroHaruya… Intel didn't assign the CVE number for stdcdrv64.sys but told us the driver was fixed.


Hiroshi Suzuki Reposted

VMW Carbon Black TAU discovered 34 unique vulnerable WDF/WDM drivers (237 file hashes), including ones made by major chip/BIOS/PC makers. By exploiting the drivers, an attacker without privilege may erase/alter firmware, and/or elevate OS privileges. blogs.vmware.com/security/2023/…


Hiroshi Suzuki Reposted

Don't miss this upcoming #APACDFIRSummit talk! 🗓️ 🎤 The Essentials of Information Gathering and Analysis Required of CSIRTs 👥 Masafumi Negishi ✍️ Join us September 7 - 8 for Free Live Online: sans.org/u/1qeJ

Tweet Image 1

Hiroshi Suzuki Reposted

Hayabusa 2.8.0 released with two new "X" options. (Not to celebrate the unfortunate renaming of twitter...we just ran out of letters 😊) -x will carve evtx records from empty pages thanks to @forensic_matt and -X will perform de-duplication of detections.

Tweet Image 1

昨年日本で、また今年USAで好評だったトレーニングを今年もBlack Hat Japan Tainings 2023で、提供します。 今回は対面での提供に戻ります。2日間で実施するので、より業務都合つけやすいと思います。奮ってご参加ください。 表示が崩れているのは僕らのせいではありませんw blackhat.com/trj-23/trainin…


I wrote an article about how to analyze malware with my tool CTO in our comapany's quarterly repoet. Malware Analysis with CTO and CTO Function Lister iij.ad.jp/en/dev/iir/059… You can download CTO from the URL below. github.com/herosi/CTO


「CTOとCTO Function Listerを使ったマルウェアの解析方法」というタイトルで、IIRに記事を書きました。 HTML: iij.ad.jp/dev/report/iir… PDF: iij.ad.jp/dev/report/iir… CTOのコード: github.com/herosi/CTO


Hiroshi Suzuki Reposted

I'm extremely excited to present at Black Hat Arsenal the new rewrite and upgrades to Noriben. I last presented it there *8* years ago, and I can't wait to show off a much evolved version. Free and simple malware sandboxing! blackhat.com/us-23/arsenal/…


Early pricing for our #BHUSA course ends this Friday. To save $300, join our practical forensic course now! blackhat.com/us-23/training…

Our #BHUSA course will attack a Windows domain, which consists of Win11 and Server 2022, with in-the-wild malware and attack tools first. Then, we will analyze them. In this single course, you can learn both red and blue team perspectives. Join our course! blackhat.com/us-23/training…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


Loading...

Something went wrong.


Something went wrong.