dtors.org
Whoami | .dtors
https://dtors.org/whoami
Int *)0xdeadd00d) = 0x41414141. I am a security researcher living in the Bay Area. My main interest being low level kernel internals, reverse engineering, exploit development, and mobile platforms (Android, iPhone, Window Mobile). I assisted with the first jailbreak on the first generation iPhone, wrote an operating system kernel. And broke hearts all over North America. E-mail: anthony.lineberry [] gmail. Http:/ xorl.wordpress.com. Create a free website or blog at WordPress.com.
dtors.org
Papers/Presentations | .dtors
https://dtors.org/paperspresentations
Int *)0xdeadd00d) = 0x41414141. These Aren’t the Permissions You’re Looking For. Circumventing the Android platform application permissions. BlackHat USA (07/2010), DefCon 18 (07/2010). Is Your Phone Pwned? Auditing, Attacking and Defending Mobile Devices. Explores the state of mobile security, finding vulnerabilities, and exploitation. BlackHat USA (07/2009), DefCon 17 (07/2009). Malicious Code Injection via /dev/mem. Framework developed for code injection into the Linux kernel using the mem device.
dtors.org
Snakes | .dtors
https://dtors.org/category/snakes
Int *)0xdeadd00d) = 0x41414141. Your photo shoot is an adrenaline rush? August 8, 2010. Today I picked up some new additions to my collection. Some amazing looking. Western Diamondback Rattlesnake). These are two. Anyway, here are a couple shots I took of them after I got them home before getting them settled into their new enclosures. Ivory Albino Crotalus atrox. Caramel Albino Crotalus atrox. Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox.
dtors.org
Uncategorized | .dtors
https://dtors.org/category/uncategorized
Int *)0xdeadd00d) = 0x41414141. August 1, 2010. After a long period of downtime, I finally decided to set something new up. I was too lazy to code up my own blog software/cms again, so decided to go with something different this time and try out WordPress we’ll see how it works out. Unfortunately I lost most everything on the old server due to a dumb mistake on my part. Oops. Lesson learned! Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox.
dtors.org
Projects | .dtors
https://dtors.org/projects
Int *)0xdeadd00d) = 0x41414141. 8211; 32bit hobby operating system/kernel I’ve been developing off and on since 2004. 8211; Static binary analysis tool written in C# that I contribute to with some other friends. 8211; First AIM client for the iPhone (Pre iPhone SDK, need to upload old source). Http:/ xorl.wordpress.com. Blog at WordPress.com. Follow “.dtors”. Get every new post delivered to your Inbox. Build a website with WordPress.com.
binaryfun.blogspot.com
bannedit's reverse engineering blog: IDA Pro Book Review
http://binaryfun.blogspot.com/2008/11/ida-pro-book-review.html
Bannedit's reverse engineering blog. Saturday, November 22, 2008. IDA Pro Book Review. I just thought I would start out with a book review. Recently I finished reading the IDA Pro Book by Chris Eagle. Chris did an absolutely amazing job on this book. He clearly explains things even in simple terms so that even the beginners can understand the concepts he discusses through out the book. Advanced users will also benefit from reading this book. I sure did. I would definitely recommend this book to anyone wh...
binaryfun.blogspot.com
bannedit's reverse engineering blog: IDC Scripting Reference
http://binaryfun.blogspot.com/2008/11/idc-scripting-reference.html
Bannedit's reverse engineering blog. Saturday, November 22, 2008. I've been doing a fair amount of IDC scripting lately and just thought I would mention that I found a great resource for IDC functions hosted at http:/ d-dome.net/idapython. The documentation is a little bit vague here and there but for the most part this is one of the best IDC references I've found. It was originally meant as a reference for idapython but the reference maps directly to the IDC scripting APIs. So what am I working on?
alex.stanev.org
Alex Stanev's Home Page
http://alex.stanev.org/indexbg.html
Човек може да каже много неща за себе си. Аз ще оставя за мен да говорят моите приятели и врагове. Ще се огранича само с малко 'технически данни'. Разбира се, винаги можете да свалите моето CV или да се свържете с мен по един или друг начин. Роден: 05 Яну 1981. Цвят на очите: Кафяв. Цвят на косата: Кафяв. Централен координатор на проектите към InnerPoint. За повече информация свалете моето CV. E-mail: alex at stanev.org. Ето ги и тях, за добро или зло. Само омрежените. :). Откъс от Параграф 22 [BG].
binaryfun.blogspot.com
bannedit's reverse engineering blog: August 2009
http://binaryfun.blogspot.com/2009_08_01_archive.html
Bannedit's reverse engineering blog. Wednesday, August 5, 2009. Reverse Engineering Named Pipes. Named Pipes fall under the category of Interprocess Communications. This type of communication is typically used to share data between processes on the same computer or remote computers on the local network. Named Pipes interaction model is very similar to normal sockets except the communication happens over SMB/CIFS. Http:/ www.sysinternals.com. Pipe Name Instances Max Instances. Protected storage 2 -1.
SOCIAL ENGAGEMENT