exploiting.wordpress.com
Black Hat USA 2014 – Computrace backdoor revisited | Exploiting Stuff.
https://exploiting.wordpress.com/2014/08/14/black-hat-usa-2014
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. Black Hat USA 2014 – Computrace backdoor revisited. After our presentation in SAS2014, we kept working together with Vitaly and Sergey on this topic and decided to go to BH with all the results. It was really cool. I think this time more people realized the risk of having such kind of technology preinstaled on their BIOS/UEFI…. Anyway, you can take a look to our slides and whitepaper here.
exploiting.wordpress.com
Cubica Labs | Exploiting Stuff.
https://exploiting.wordpress.com/2014/03/18/cubica-labs
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. The day finally came. This is Cubica Labs. You will find more information on LinkedIn here. Or, eventually, at our webpage: www.cubicalabs.com. By aLS - on March 18, 2014. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. Notify me of new comments via email.
exploiting.wordpress.com
Catching up – Security Analyst Summit 2014 | Exploiting Stuff.
https://exploiting.wordpress.com/2014/08/14/catching-up-security-analyst-summit-2014
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. Catching up – Security Analyst Summit 2014. Yeah, well. A bit late… I know. This last months have been a complete madness. But, a good madness, I have to say. So I will try to catch up with a few quick posts. In this joint talk I’ve presented our (with Alfredo Ortega) original findings, and introduced the topic so them could show yours, together with some new -remote- attacks they’ve worked on. You are co...
exploiting.wordpress.com
A new episode. | Exploiting Stuff.
https://exploiting.wordpress.com/2013/11/27/a-new-episode
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. Eight years has passed since my first interview at Core Security. I’ve got to say, it has been an amazing experience. I’ve had the luck to work with some of the greatest researchers of the infosec industry (and others industries too). But, as you can imagine, 8 years developing binary exploits and researching for (only) one company can be too much. By aLS - on November 27, 2013. Leave a Reply Cancel reply.
exploiting.wordpress.com
[Quickpost] [IDAPython] Locating libc in an unknown firmware without string references. | Exploiting Stuff.
https://exploiting.wordpress.com/2012/07/02/quickpost-idapython-locating-libc-in-an-unknown-firmware-without-string-references
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. Quickpost] [IDAPython] Locating libc in an unknown firmware without string references. Very often, you find yourself reversing a completely unknown firmware from some memory dump, and know very little about it. Probably, the processor architecture, the kind of work it makes, etc. This last two points are, in my opinion, the most important ones. The basic idea is pretty simple. As generally, all the li...
exploiting.wordpress.com
HTML5 Heap Spray. EUSecWest 2012 | Exploiting Stuff.
https://exploiting.wordpress.com/2012/10/03/html5-heap-spray-eusecwest-2012
Reverse Engineering, Assembly, Exploit writing, Rootkits, Debuggers, Tools, Code Snippets, and more. HTML5 Heap Spray. EUSecWest 2012. HTML5 Heap Spray – EUSecWest 2012. Federico and I have just come back from our holidays after EUSecWest. The conference was awesome, as usual. Very interesting talks, great ppl, and of course, great hosts. In our talk, we presented a new technique to populate the heap in a multithreaded fashion making use of HTML5. It’s very simple and it offers several benefits:. DEPS &#...
firebitsbr.wordpress.com
firebits | VSLA - Virtual Security Labs Anywhere
https://firebitsbr.wordpress.com/author/mrisonho
Pular para o conteúdo. VSLA – Virtual Security Labs Anywhere. Just another security.com site. Arquivo do autor: firebits. Fevereiro 16, 2016. Pacman -S go –noconfirm. Mkdir -p /go/{bin,src}. Echo “export GOPATH= /go” .bashrc. Echo “export GOPATH= /go” .bash profile. Go version go1.5.3 linux/amd64. Fevereiro 16, 2016. Https:/ wiki.archlinux.org/index.php/Go. Gophish – Golang Open-Source Phishing Toolkit. Fevereiro 3, 2016. Gophish – Golang Open-Source Phishing Toolkit. Fedora 23 x86 64. Janeiro 2, 2016.
SOCIAL ENGAGEMENT