oneh.wordpress.com
the oneha|f lab | oneha|f Lab
https://oneh.wordpress.com/about
The oneha f lab. The oneha f lab. A place for malware research, malware code and behaviour analysis, discuss about defending malwares, incident response, reverse engineering, assembly, worm techniques and more …. You can reach this group at http:/ groups.google.com/group/onehalf. And the web blog is at https:/ oneh.wordpress.com. Posted August 14, 2008 by oneh. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public).
oneh.wordpress.com
regmon | oneha|f Lab
https://oneh.wordpress.com/2008/08/17/regmon
The oneha f lab. Regmon and filemon are the two important tools used in malware analysis. Any malware, when it first infects the Windoze box, it infects the registry. the reason behind this is to make sure that the malware runs every time windoze boots up and to disable other security settings of windoze / av’s. So before loading the malware, take a snapshot of the registry using regmon. then load the malware into the sandbox or the VM system and run the regmon. regmon clearly shows what all the ...Addre...
oneh.wordpress.com
hacker manifesto | oneha|f Lab
https://oneh.wordpress.com/2008/08/19/hacker-manifesto
The oneha f lab. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike. Posted August 19, 2008 by oneh. Tagged with hacker manifesto. Spyware signature file ». Leave a Reply Cancel reply. Enter your comment here.
oneh.wordpress.com
September | 2008 | oneha|f Lab
https://oneh.wordpress.com/2008/09
The oneha f lab. Archive for September 2008. I am writing a small spyware removal software … I am writing this tool in VC and in ASM … currently I am writing a module to build the signature database and methods to retrieve informations from the DB … while doing this work I came across a good website which has excellent information about the spywares and it is http:/ www.spywaredb.com. 8230; it has lots of information about many spywares … I am totally using it and it’s very useful. Join oneha f group.
greathacker.blogspot.com
---Great Hackers---: INTERNET HOLES - ELIMINATING IP ADDRESS FORGERY
http://greathacker.blogspot.com/2007/05/internet-holes-eliminating-ip-address.html
Monday, May 7, 2007. INTERNET HOLES - ELIMINATING IP ADDRESS FORGERY. INTERNET HOLES - ELIMINATING IP ADDRESS FORGERY. The Internet is now the world's most popular network and it is full of. Potential vulnerabilities. In this series of articles, we explore the. Vulnerabilities of the Internet and what you can do to mitigate them. An Introduction IP Address Forgery. The Internet Protocol (IP) (RFC791) provides for two and only two. Functions. It defines a datagram that can be routed through the. Forger on...