tr0n.net
hacking » tr0n.net
https://www.tr0n.net/tag/hacking
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. NetCat – Bind Shell. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31. Victim: netstat -an grep LISTEN grep tcp. Attacker: nc victim IP port. Define PORT x39 x39. Keep to two bytes. I make sure there are no nulls. The string count will terminate at the first x00. The Shellcode is %d Bytes Long n. Next I throw 0xAAAAAAAA into every register before shellcode execution. Mov $0xAAAAAAAAAAAAAAAA, %rax n. The attack ...
tr0n.net
firmware » tr0n.net
https://www.tr0n.net/tag/firmware
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Kovah, who discovered with his partners a lot of firmware vulnerabilities in Macs. Last year has now designed with Trammell Hudson, a security engineer a worm they dubbed Thunderstrike 2 that can spread between MacBooks undetected. The attack is] really hard to detect, it’s really hard to get rid of, and it’s really hard to protect against something that’s running inside the firmware. Find out more at BlackHat. Or read an amazing article @wired.
tr0n.net
MacBook firmworm created » tr0n.net
https://www.tr0n.net/2015/08/macbook-firmworm-created
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Stagefright – Mother of all Android Vulnerabilities. Malware use DYLD PRINT TO FILE exploit. Kovah, who discovered with his partners a lot of firmware vulnerabilities in Macs. Last year has now designed with Trammell Hudson, a security engineer a worm they dubbed Thunderstrike 2 that can spread between MacBooks undetected. Find out more at BlackHat. Or read an amazing article @wired. Joachim Astel’s Blog.
tr0n.net
Security » tr0n.net
https://www.tr0n.net/category/security
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Locky’s New Anti-Sandbox Technique And Howto Crack It. Floser Bacurio and Roland Dela Paz published an interesting article about Locky’s new anti-sandbox technique and how to crack it. Cracking Locky’s New Anti-Sandbox Technique. NetCat – Bind Shell. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31. Victim: netstat -an grep LISTEN grep tcp. Attacker: nc victim IP port. Define PORT x39 x39. Keep to two bytes.
tr0n.net
firmworm » tr0n.net
https://www.tr0n.net/tag/firmworm
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Kovah, who discovered with his partners a lot of firmware vulnerabilities in Macs. Last year has now designed with Trammell Hudson, a security engineer a worm they dubbed Thunderstrike 2 that can spread between MacBooks undetected. The attack is] really hard to detect, it’s really hard to get rid of, and it’s really hard to protect against something that’s running inside the firmware. Find out more at BlackHat. Or read an amazing article @wired.
tr0n.net
malware » tr0n.net
https://www.tr0n.net/tag/malware
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Locky’s New Anti-Sandbox Technique And Howto Crack It. Floser Bacurio and Roland Dela Paz published an interesting article about Locky’s new anti-sandbox technique and how to crack it. Cracking Locky’s New Anti-Sandbox Technique. Qu’est-ce que LOCKY ferait? Avec ce petit script que vous pouvez voir quel type de fichiers serait chiffré en cas d’infection par le LOCKY virus. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27.
tr0n.net
DYLD_PRINT_TO_FILE » tr0n.net
https://www.tr0n.net/tag/dyld_print_to_file
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Malware use DYLD PRINT TO FILE exploit. Only a couple of days after OS X a privilege escalation vulnerability in OS X. 1010 was discovered a researcher at Malwarebytes spot a new adware installer. That uses DYLD PRINT TO FILE exploit. What you can do? Security update while you get p0wned. 8211; A kernel extension adding mitigations to protect SUID/SGID binaries. Tags: DYLD PRINT TO FILE. Privilege Escalation Vulnerability In OS X 10.10.
tr0n.net
worm » tr0n.net
https://www.tr0n.net/tag/worm
Second Universal Cybernetic-Kinetic Ultra-Micro Programmer. Kovah, who discovered with his partners a lot of firmware vulnerabilities in Macs. Last year has now designed with Trammell Hudson, a security engineer a worm they dubbed Thunderstrike 2 that can spread between MacBooks undetected. The attack is] really hard to detect, it’s really hard to get rid of, and it’s really hard to protect against something that’s running inside the firmware. Find out more at BlackHat. Or read an amazing article @wired.