bsodtutorials.wordpress.com
Other Pages | Machines Can Think
https://bsodtutorials.wordpress.com/otherpages
Windows Internals, Theorectical Computer Science, Mathematics and Philosophy. There are many good websites and blogs which are related to Reverse Engineering, BSOD Debugging and Mathematics. This page has been created to house all the websites which teach the aforementioned topics to the best of my knowledge. If you would like for your website to be added to the list, then please post a request in the comments section. Adam Pooley Web Developer. BSOD Kernel Dump Analysis. Jared is a Global Moderator at S...
kumelsnote.blogspot.com
hello.asm | KUMEL'S NOTE
http://kumelsnote.blogspot.com/2011/12/helloasm.html
Sharing my experiences in IT security. KUMΞL Sunday, January 01, 2012 Programming. In naturally computer just know 0 and 1 (binnary), it will processing an instruction which created only from 0 and 1, and this stat usually call as a machine language. Assembly is a low level language and almost like as a machine language. Why must we learn about an assembly language? Some differeces way of create the syntax are :. NASM is begining the comment with ";", and AT&T is begin with #(hash). For example if we wan...
hshrzd.wordpress.com
Tic-Tac-Toe (16 bit, tasm) | hasherezade's 1001 nights
https://hshrzd.wordpress.com/mycode/tic-tac-toe-16-bit-asm
Hasherezade's 1001 nights. Projects and tasks that I do in my free time. ASCII painter (16-bit, tasm). Tic-Tac-Toe (16 bit, tasm). Tic-Tac-Toe (16 bit, tasm). Again some piece of my old asm code (writen in 2003). This one works in graphic mode. Can be deployed on DOS and Windows versions = XP. Https:/ github.com/hasherezade/asm16 projects/blob/master/Tic-Tac-Toe/main.asm. Tic tac toe.zip. Compile with tasm, link:. Http:/ hasherezade.net/tools/TASM.zip. Works in 2 modes:. Leave a Reply Cancel reply. Lectu...
kumelsnote.blogspot.com
April 2012 | KUMEL'S NOTE
http://kumelsnote.blogspot.com/2012_04_01_archive.html
Sharing my experiences in IT security. Landing in an unicode application. KUMΞL Friday, April 27, 2012 Exploit. After several time reading an article about unicode in corelan.be. Now let me try how to do that with my own knowledge. Here im using the application GOM Player 2.1.33.5071, as we knew if it already exploited several months ago and we will find the exploit of it here. So im using the proof of concept how to crashing the application to explain how to build an exploit in it (unicode application).
kumelsnote.blogspot.com
September 2011 | KUMEL'S NOTE
http://kumelsnote.blogspot.com/2011_09_01_archive.html
Sharing my experiences in IT security. The risk of simple answer from secure question. KUMΞL Tuesday, September 27, 2011 Security Awareness. If we want to create new account at some network aplication, we usually found some field to secure question. The secure question used to resset password if we have forgotten the password of that account, but with the simple answer of secure question everyone can use it as a way to owned our account. After Vince believe that Anton is real. If andre didnt know the ans...
kumelsnote.blogspot.com
October 2011 | KUMEL'S NOTE
http://kumelsnote.blogspot.com/2011_10_01_archive.html
Sharing my experiences in IT security. KUMΞL Monday, October 24, 2011 Crack. May be it is an old trick in sec world, but im just divide it for us cause this morning theres some one give me a zip file which he has forgot the password of it and he asked me to crack its password. How to crack a zips password? Hem, i had never did it before, but ill try it. My firs step is searching some tools which there is in my PC, and ive found fcrackzip. Ill know if ive try it. Root@victim: # fcrackzip -h.
kumelsnote.blogspot.com
January 2013 | KUMEL'S NOTE
http://kumelsnote.blogspot.com/2013_01_01_archive.html
Sharing my experiences in IT security. Brief inside DEP and ROP. KUMΞL Monday, January 07, 2013 Briefing. DEP is data execution prevent, it is some kind of windows protection. DEP was protecting with make the stack of windows application to be non executable, so if we put some payload in the stack then we dont allow to execute it. But we can bypass DEP protection with some method which available in Win32 APIs. Some method to bypass DEP. The goal is to set that value to EXECUTE READWRITE. Learning Goals*:...
hshrzd.wordpress.com
PE-bear – version 0.3.6 avaliable! | hasherezade's 1001 nights
https://hshrzd.wordpress.com/2014/02/11/pe-bear-version-0-3-6-avaliable
Hasherezade's 1001 nights. Projects and tasks that I do in my free time. ASCII painter (16-bit, tasm). Tic-Tac-Toe (16 bit, tasm). PE-bear version 0.3.5 avaliable! Solving 7 years old crackme (CC-Team, Arigo CrackMe8) →. PE-bear version 0.3.6 avaliable! February 11, 2014. 8211; Removed memory leak on file releasing. 8211; Fixed invalid names parsing in bound imports. 8211; Possibility to move any data directory. 8211; Dumping certificate into a file. Programmer and researcher, interested in InfoSec.