Search:

Type: Posts; User: m0nna

Search: Search took 0.06 seconds.

  1. Replies
    5
    Views
    2,660

    contacted the admin, now both part1 and part2 is...

    contacted the admin, now both part1 and part2 is visible from the home page.
  2. Replies
    5
    Views
    2,660

    i guess you have to login to view it, even i...

    i guess you have to login to view it, even i faced the same problem when not logged in......after logging in its working
  3. Replies
    5
    Views
    2,660

    Thanks buddy :-).....ya i know the images are...

    Thanks buddy :-).....ya i know the images are loading real slow :-(
  4. Replies
    5
    Views
    2,660

    SEH overflow exploit POC

    Hi All,

    The writeup of the seh exploit (which is wrote few months back) is published here:


    part 1:
    SEH Overflow exploit POC Part 1 - Blogs - Garage4hackers Forums


    part 2:
  5. Replies
    4
    Views
    2,065

    Awesome work buddy :).....keep posting ;)

    Awesome work buddy :).....keep posting ;)
  6. Replies
    1
    Views
    3,891

    python book covering standard libraries

    Hi All,

    found this book on amazon, "http://www.amazon.com/Python-Standard-Library-Example-Developers/dp/0321767349", this book covers most of the standard libraries with examples....


    In...
  7. Thread: Hello

    by m0nna
    Replies
    9
    Views
    2,825

    Hi all, thanks a lot for you response, and i'm...

    Hi all, thanks a lot for you response, and i'm glad you all liked it..and i think garage4hackers.com is an excellent place to share the knowledge, i will keep posting more.....thanks once again guys...
  8. Replies
    4
    Views
    6,836

    Part 5 Shellcode analysis Now its time to...

    Part 5

    Shellcode analysis

    Now its time to analyze the shellcode to know its capabilities, the below screeshot shows the extracted shellcode
    ...
  9. Replies
    4
    Views
    6,836

    Part 4 Searching for the creator object in pdf...

    Part 4

    Searching for the creator object in pdf document using pdf-parser showed that object 8 contians the creator info, but in this case instead of the string which identifies the creator, it...
  10. Replies
    4
    Views
    6,836

    Part 3 Extracting Javascript To extract...

    Part 3

    Extracting Javascript

    To extract javascript for object first we need to decompress the zlib compressed data, only then the javascript would make sense. Pdf-parser.py was used to...
  11. Replies
    4
    Views
    6,836

    Part 2 Analysis Now we know the structure...

    Part 2

    Analysis

    Now we know the structure of the pdf document, lets analyze the malicious pdf sample. When i was look through my spam folder in my personal mail id, i got this sample, after...
  12. Replies
    4
    Views
    6,836

    Malicious PDF analysis

    Part 1

    This post contains the analysis that i carried out on a malicious pdf file, exploiting a stack based overflow vulnerablity in the adobe acrobat reader. Before analyzing the malicious pdf,...
  13. Thread: Hello

    by m0nna
    Replies
    9
    Views
    2,825

    Hello

    Hi My name is Monnappa, i'm working as Info Security Investigator, my field of intereste is reverse engineering, malware analysis, exploit development, python scripting, assembly language.
Results 1 to 13 of 13