flinkd.org
pyoor « Flinkd!
http://www.flinkd.org/author/pyoor
Fuzzing, reverse engineering, exploit development, pure gibberish. Installing Google Play on the Android Emulator (API 21 – “Lollipop”). With the recent release of Android 5.x, I decided that it was time to release an update on how to install the Google Play Store on the Android Emulator. This document outlines the steps required using the latest version of the Android SDK (Revision 24.0.2) and is focused on Android 5.0.1 (API 21). Install the Android 5.0.1 Image. Pyoor@localhost tools]$ ./android avd.
flinkd.org
ASF File Format « Flinkd!
http://www.flinkd.org/projects/peach-pits/peach-pit-for-the-asf-file-format-specification
Fuzzing, reverse engineering, exploit development, pure gibberish. Xml version=1.0 encoding=utf-8? Peach version=1.0 Include ns=default src=file:defaults.xml/ DataModel name=AsfFileFormat! 31 Header Object (mandatory, one only) - Block name=HeaderObject minOccurs=1 maxOccurs=1 Blob name=ObjectID value=3026B2758E66CF11A6D900AA0062CE6C valueType=hex token=true/ Number name=ObjectSize size=64 endian=little/! Size Relation - Number name=NumberOfHeaderObjects size=32 endian=little/! See if this needs a count ...
flinkd.org
Peach Pits « Flinkd!
http://www.flinkd.org/projects/peach-pits
Fuzzing, reverse engineering, exploit development, pure gibberish. Here’s a collection of Peach Pits (fuzz templates) I’ve developed for the Peach Fuzzing Framework. Please note that the following Peach Pits have been written for Peach v2.3.9 or less:. ZIP File Format Specification. RAR File Format Specification. ASF File Format Specification. AVI File Format Specification. CAB File Format Specification. QT MOV/MP4 File Format Specification. Theme by Templates Next.
flinkd.org
MOV/MP4 File Format « Flinkd!
http://www.flinkd.org/projects/peach-pits/peach-pit-for-the-mov-file-format-specification
Fuzzing, reverse engineering, exploit development, pure gibberish. Xml version=1.0 encoding=utf-8? Peach version=1.0 author=Jason Kratzer site=http:/ www.flinkd.org Include ns=default src=file:defaults.xml/ DataModel name=MP4FileFormat Block name=initialBlock minOccurs=0 maxOccurs=1 Number name=ftypSize size=32 endian=big Relation type=size of=ftypBlock expressionSet=size 8 expressionGet=size-8/ /Number String name=ftypIdentifier value=ftyp token=true/ Block name=ftypBlock String name=maj...Pnot' - Movie...
ihazomgsecurityskillz.blogspot.com
ihazomgsecurityskillz: March 2011
http://ihazomgsecurityskillz.blogspot.com/2011_03_01_archive.html
Just another security related blog. Saturday, March 26, 2011. Linux Exploit Writing Tutorial Pt 2 - Stack Overflow ASLR bypass Using ret2reg. As expected the part 2 of my tutorial series, I'm not going to repeat myself again, so without any other introductions here it is:. Linux Exploit Writing Tutorial Pt 2 - Stack Overflow ASLR bypass Using ret2reg. Saturday, March 19, 2011. Linux exploit development part 1 - Stack overflow. Anyways here is the PDF: Linux exploit development part 1 - Stack overflow.
flinkd.org
Installing Google Play on the Android Emulator (API 18) « Flinkd!
http://www.flinkd.org/2013/12/installing-google-play-on-the-android-emulator-api-18
Fuzzing, reverse engineering, exploit development, pure gibberish. Installing Google Play on the Android Emulator (API 18). Updated (2-11-15): I’ve written a new post which describes installing Google Play on Android 5.x. You can find that post, here. With that, let’s begin by launching the SDK manager. We’ll first need to ensure that Android 4.3 (API 18) is installed. Pyoor@localhost tools]$ ./android sdk. Pyoor@localhost tools]$ ./android avd. Please note that this package will only work for Android 4&...
flinkd.org
Decrypting AES With Burp Intruder « Flinkd!
http://www.flinkd.org/2014/02/decrypting-aes-with-burp-intruder
Fuzzing, reverse engineering, exploit development, pure gibberish. Decrypting AES With Burp Intruder. Recently, I’ve noticed a significant rise in the number of mobile applications making use of local encryption in order to encrypt request parameters prior to passing them over the wire. Not only does this make casual observation of the traffic more difficult, any type of parameter tampering/manipulation will likely fail unless the supplied payload can be successfully decrypted by the backend. The IIntrud...
flinkd.org
Projects « Flinkd!
http://www.flinkd.org/projects
Fuzzing, reverse engineering, exploit development, pure gibberish. Check back here soon! Since this blog is still a work in progress I haven’t had the opportunity to fully populate it just yet. I’ll be storing all of my code snippets, Peach PITs, and other miscellaneous projects here. Theme by Templates Next.
flinkd.org
Installing Google Play on the Android Emulator (API 21 – “Lollipop”) « Flinkd!
http://www.flinkd.org/2015/02/installing-google-play-on-the-android-emulator-api-21-lollipop
Fuzzing, reverse engineering, exploit development, pure gibberish. Installing Google Play on the Android Emulator (API 21 – “Lollipop”). With the recent release of Android 5.x, I decided that it was time to release an update on how to install the Google Play Store on the Android Emulator. This document outlines the steps required using the latest version of the Android SDK (Revision 24.0.2) and is focused on Android 5.0.1 (API 21). Install the Android 5.0.1 Image. Pyoor@localhost tools]$ ./android avd.