Home
hacker0ni
Cancel

The HTTP/2 Rapid Reset Vulnerability: A Critical Flaw in Modern Web Communication

The HTTP/2 Rapid Reset Vulnerability: A Critical Flaw in Modern Web Communication Introduction In the realm of web communication protocols, HTTP/2 has been a game-changer. It was designed to impr...

Dropping Ransomware Payouts and Why This Is Good For The Industry

Intro Ransomware attacks have been a major concern for individuals and organizations alike in recent years. These attacks involve hackers encrypting a victim’s data and demanding payment in exchan...

Building Your Own Open-Source SIEM, Part I: AAAAAH!

Intro This will be a post series where I discuss the details of an open-source SIEM and how you can deploy it on your own infrastructure. This will heavily focus on Security Onion 2 as it gives us ...

Implementing File Integrity Monitoring with Osquery

In this post I’d like to talk a bit about file integrity monitoring and how you can implement it using Osquery. Let’s jump in. Requirements: Osquery installation Basic understanding of the Li...

Linux Memory Forensics

We can sum up forensic analysis as the different methods used in evidence acquisition, analysis of evidence, and documentation of the consequences of a security incident. After a confirmed security...

Import hashing (aka imphashes)

In our fuzzy hashes post, we learned about fuzzy hashing and how it’s a different approach to malware classification. In this post we’ll explain what an import hash is and how we can utilize it in ...

Building Your Own Dynamic Malware Analysis Lab

Welcome back to my personal blog! In this blog post, I will introduce a couple of tools that you can use to analyze malware behavior at home. You will require a computer that can handle 2 virtual ...

Android Security Issues, Brought to You by OEMs

In this post I’d like to dive into the Android devices I’ve used in the past and how they all had inherent security issues caused by OEMs making a ton of customizations, adding their bloatware and ...

Fuzzy Hashing vs Regular Hashing

In this post we will compare fuzzy hashing to regular hashing. Now let’s begin with digestion which is what people usually refer to when they say hashing. Hashing is a mathematical one-way functio...

Using YARA

YARA is a multi-platform tool that lets you identify patterns in files. By identifying particular strings and signatures in a binary, you can determine the type of the file and gather a lot of info...