Mohamed Naim

17 Flips | 2 Magazines | @MHDM | Keep up with Mohamed Naim on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Mohamed Naim”

OpenBSD Timestamps

It’s not breaking news that OpenBSD strives to be at the forefront of security. It appears that their TCP timestamp option behavior reflects this as …

Crafting Overlapping Fragments ..... Eventually

I was doing some testing this week and needed to craft some overlapping fragments. Though I did some extensive work and research of overlapping …

Crafting Overlapping Fragments ..... Eventually (Part 2)

In my last blog I covered the theory of fragmentation. Just to remind you – our ultimate goal is to use Scapy to craft overlapping fragments. So far, …

Crafting Overlapping Fragments ….. Finally!

In the two posts leading up to this one, I discussed the theory of fragmentation and checksums . Now, we're finally ready to see the Scapy code that …

What I Learned At Camp

I just returned from teaching my Scapy course at a Cyber Camp in Richmond, VA. The Cyber Camps are part of the US Cyber Challenge to educate and …

Snort Fortification Against Evasions

I'm trying to post this before the arrival of hurricane Irene and the almost certain power outage since our neighborhood receives electricity from …

A cunning way to deliver malware

Potentially unwanted programs, also known as PUPs, continue to be a real nuisance. A recent blog post by Will Dormann on CERT.org shows the …

IDA Dalvik debugger: tips and tricks

One of the new features of IDA 6.6 is the Dalvik debugger, which allows us to debug Dalvik binaries on the bytecode level.Let us see how it can help …

Web Development

part 1: disassembling and understanding shellcode

About a month ago I signed up for the Securitytube Linux Assembly Expert certification to get a deeper understanding of assembly and GDB. Doing so …

Forensics

IOC Bucket

IOC Bucket is a free community driven platform dedicated to providing the security community a way to share quality threat intelligence in a simple …

Intelligence

Malware Analysis with pedump, Author: Guy Bruneau

Are you looking for a tool to analyze Windows Portable Executable (PE) files? Consider using pedump a ruby win32 PE binary file analyzer. It …

Forensics

Microsoft Seized No-IP Domains, Millions of Dynamic DNS Service Users Suffer Outage

In an effort to crackdown on cyber crimes, Microsoft has taken a legal action against a malware network what it thought is responsible for more than …

Rig Exploit Kit Used in Recent Website Compromise

Black Hat USA 2014: Focus on Reverse Engineering

Reverse engineering: The somewhat arcane art that helps illuminate the inner workings of proprietary systems, obfuscated or otherwise, is always a …

Information Security

Champaign

Building better cybersecurity, one video at a time<p>05.28.14 - Permalink<p><i>NCSA is helping science and engineering build stronger cybersecurity with</i> …

Video Tutorials

reddalert

AWS security monitoring/alerting tool built on top of Netflix's EDDA project.<p>What do we want to see? Examples:<p>security group whitelists some weird …

Command-line

Integer Overflows and Promotions

<i>C language is language of choice for system programming, embedded systems and also viable option for many other applications. While it is not likely</i> …

Global Policy