dtors.org
Whoami | .dtors
https://dtors.org/whoami
Int *)0xdeadd00d) = 0x41414141. I am a security researcher living in the Bay Area. My main interest being low level kernel internals, reverse engineering, exploit development, and mobile platforms (Android, iPhone, Window Mobile). I assisted with the first jailbreak on the first generation iPhone, wrote an operating system kernel. And broke hearts all over North America. E-mail: anthony.lineberry [] gmail. Http:/ xorl.wordpress.com. Create a free website or blog at WordPress.com.
dtors.org
Papers/Presentations | .dtors
https://dtors.org/paperspresentations
Int *)0xdeadd00d) = 0x41414141. These Aren’t the Permissions You’re Looking For. Circumventing the Android platform application permissions. BlackHat USA (07/2010), DefCon 18 (07/2010). Is Your Phone Pwned? Auditing, Attacking and Defending Mobile Devices. Explores the state of mobile security, finding vulnerabilities, and exploitation. BlackHat USA (07/2009), DefCon 17 (07/2009). Malicious Code Injection via /dev/mem. Framework developed for code injection into the Linux kernel using the mem device.
dtors.org
Snakes | .dtors
https://dtors.org/category/snakes
Int *)0xdeadd00d) = 0x41414141. Your photo shoot is an adrenaline rush? August 8, 2010. Today I picked up some new additions to my collection. Some amazing looking. Western Diamondback Rattlesnake). These are two. Anyway, here are a couple shots I took of them after I got them home before getting them settled into their new enclosures. Ivory Albino Crotalus atrox. Caramel Albino Crotalus atrox. Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox.
blog.teusink.net
blog.teusink.net: Passwords stored using reversible encryption: how it works (part 1)
http://blog.teusink.net/2009/08/passwords-stored-using-reversible.html
About security, pentesting and everything else. Tuesday, August 25, 2009. Passwords stored using reversible encryption: how it works (part 1). This feature is not enabled by default but I’ve seen it a couple of times in customer networks. As I couldn’t find any description of how this mechanism works or any tool to recover these passwords, I decided to investigate. When you change your password on a domain that has reversible encryption enabled, a password filter. You can look at this structure in an AD ...
dtors.org
Uncategorized | .dtors
https://dtors.org/category/uncategorized
Int *)0xdeadd00d) = 0x41414141. August 1, 2010. After a long period of downtime, I finally decided to set something new up. I was too lazy to code up my own blog software/cms again, so decided to go with something different this time and try out WordPress we’ll see how it works out. Unfortunately I lost most everything on the old server due to a dumb mistake on my part. Oops. Lesson learned! Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox.
dtors.org
Projects | .dtors
https://dtors.org/projects
Int *)0xdeadd00d) = 0x41414141. 8211; 32bit hobby operating system/kernel I’ve been developing off and on since 2004. 8211; Static binary analysis tool written in C# that I contribute to with some other friends. 8211; First AIM client for the iPhone (Pre iPhone SDK, need to upload old source). Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox. Build a website with WordPress.com.
bsodtutorials.wordpress.com
Other Pages | Machines Can Think
https://bsodtutorials.wordpress.com/otherpages
Windows Internals, Theorectical Computer Science, Mathematics and Philosophy. There are many good websites and blogs which are related to Reverse Engineering, BSOD Debugging and Mathematics. This page has been created to house all the websites which teach the aforementioned topics to the best of my knowledge. If you would like for your website to be added to the list, then please post a request in the comments section. Adam Pooley Web Developer. BSOD Kernel Dump Analysis. Jared is a Global Moderator at S...
blog.teusink.net
blog.teusink.net: July 2010
http://blog.teusink.net/2010_07_01_archive.html
About security, pentesting and everything else. Sunday, July 4, 2010. Hacking wireless presenters with an Arduino and Metasploit. I gave a presentation this week at Hack in the Box. In Amsterdam about hacking wireless presenters (slides here. At lot of security research has been done on wireless keyboards in the last couple of years. 27Mhz keyboards were attacked successfully and can be sniffed using a home-built device. Needless to say doing so may be a criminal offence in your country. I started my res...
addxorrol.blogspot.com
ADD / XOR / ROL: Why Intelligence Reform is necessary
http://addxorrol.blogspot.com/2014/01/why-intelligence-reform-is-necessary.html
ADD / XOR / ROL. A blog about reverse engineering, mathematics, politricks and some more . Sunday, January 12, 2014. Why Intelligence Reform is necessary. This is the first part of a two-part blog post on the need for intelligence reform. Why do I even feel entitled to an opinion? The Russians and Chinese are much worse, so where's the outrage about them? People are outraged at the disclosures about widespread espionage by English-speaking countries while they are not outraged by Russian or Chinese espio...