antoxar.blogspot.com
Details are still coming in: Detecting abnormal executable files using binary code mining
http://antoxar.blogspot.com/2013/02/detecting-abnormal-executable-les-using.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Thursday, February 7, 2013. Detecting abnormal executable files using binary code mining. Rechkov. Lomonosov Report. PS Please don't shy to add comments and ideas! Subscribe to: Post Comments (Atom). Detecting abnormal executable files using binary co. Exploring and exploiting Lenovo firmware secrets. What does this command? Черный ящик и внедрение ошибок на Black Hat Trainings. VNSECURITY TEAM (Vietnam Internet Security Research Team).
antoxar.blogspot.com
Details are still coming in: April 2011
http://antoxar.blogspot.com/2011_04_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Tuesday, April 12, 2011. IDAPython and CTF Task. Few month ago I read post “IDA Python = Love” in “Hacker” journal and been a pist off, because it is translate from HexBlog. And didn't told about another cool IDAPython feature – Appcall. Which appear in IDA 5.6. Here is user guide. Appcall is a mechanism used to call functions inside the debugged program from the debugger or your script as if it were a built-in function. If you have a He...
blog.0day.jp
0day.jp (ゼロデイ.JP): 「Linux/AES.DDoS」MIPS/ARMルーターマルウェア感染攻撃
http://blog.0day.jp/2015/07/linuxaesddosarm.html
Blog of { threat exploit malware vulnerability } research for Japan security. 金曜日, 7月 03, 2015. 12300;Linux/AES.DDoS」MIPS/ARMルーターマルウェア感染攻撃. Ip": "61.160.213.58", "SOA": " nmc1.ptt.js.cn. postmaster.nmc1.ptt.js.cn.", "city": "Nanjing", "region": "Jiangsu", "country": "CN", "loc": "32.0617,118.7778", "org": "AS23650 AS Number for CHINANET jiangsu province backbone" }. File size Ratio Format Name - - - - - - - - - - - - - - - - - - - - - - - - - 1156461. 参考調査記事⇒【 -1-. 12305;【 -2-. LinuxAgent malware sample ...
deependresearch.org
DeepEnd Research: August 2012
http://www.deependresearch.org/2012_08_01_archive.html
Monday, August 27, 2012. CVE-2012-4681 Java 7 0-Day vulnerability analysis. Update Aug.30, 2012. Oracle issued update 7 (7u7), which fixed the vulnerability. Update: Aug. 28, 2012. Rapid 7 / Metasploit released their module. And we get a lot of questions related to it from people who wish to compare. See below the original exploit source, to be run from the command line with a security manager enabled, and it will print the contents of the C: root directory. Update: Aug. 28, 2012. At this point the patch...
deependresearch.org
DeepEnd Research: CVE-2012-4681 Java 7 0-Day vulnerability analysis
http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html
Monday, August 27, 2012. CVE-2012-4681 Java 7 0-Day vulnerability analysis. Update Aug.30, 2012. Oracle issued update 7 (7u7), which fixed the vulnerability. Update: Aug. 28, 2012. Rapid 7 / Metasploit released their module. And we get a lot of questions related to it from people who wish to compare. See below the original exploit source, to be run from the command line with a security manager enabled, and it will print the contents of the C: root directory. Update: Aug. 28, 2012. At this point the patch...
deependresearch.org
DeepEnd Research: Java 7 0-Day vulnerability information and mitigation.
http://www.deependresearch.org/2012/08/java-7-0-day-vulnerability-information.html
Monday, August 27, 2012. Java 7 0-Day vulnerability information and mitigation. Update Aug.30, 2012. Oracle issued update 7 (7u7), which fixed the vulnerability. That VulnDisco SA CANVAS exploit pack now has a new Java 0-day. It makes you wonder if it is the same exploit that leaked from, or was found in the wild and then added to the CANVAS pack. Or if it is totally unrelated and there are two 0-day exploits now. The Oracle patch cycle is 4 months (middle of February, June, October) with bugfixes 2 mont...
deependresearch.org
DeepEnd Research: Dirt Jumper DDoS Bot - New versions, New targets
http://www.deependresearch.org/2011/10/dirt-jumper-ddos-bot-new-versions-new.html
Wednesday, October 19, 2011. Dirt Jumper DDoS Bot - New versions, New targets. By Andre' M. DiMino. I recently encountered a malware sample that when sandboxed, exhibited a great deal of DDoS-like activity toward a large number of URLs. When I looked at the network traffic a bit more closely, it reminded me of the Dirt Jumper DDoS bot that I read about in an excellent blog post by Curt Wilson. And is gaining more buyers in underground market due to easy implementation and powerful attack methods. Sets va...
antoxar.blogspot.com
Details are still coming in: January 2015
http://antoxar.blogspot.com/2015_01_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Monday, January 5, 2015. Using WPP to trace usermode apps. I've created sample app here. To don't forget howto include WPP into system service. For more details in Russian blog post is on habrahabr. Subscribe to: Posts (Atom). Using WPP to trace usermode apps. Exploring and exploiting Lenovo firmware secrets. What does this command? Черный ящик и внедрение ошибок на Black Hat Trainings. Tor – Xác định các exit relay độc hại.
antoxar.blogspot.com
Details are still coming in: July 2013
http://antoxar.blogspot.com/2013_07_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Monday, July 22, 2013. UFOCTF WriteUP: Mmmm, Whiskey metal. PS I already get a few tips:. Key is SHA256 or decoded string. My brother always make "Burp" and likes tea. Here you can find a dump. Https:/ docs.google.com/file/d/0Bw72cstp5cGsMVlDSlBJU05fdVE. Here is a short how to. First you should find "Burp" log string in the memory dump. There is a two ways here. Using DebugView. Or just using search in WinDbg. Take a look inside. Buildin...
antoxar.blogspot.com
Details are still coming in: March 2011
http://antoxar.blogspot.com/2011_03_01_archive.html
Details are still coming in. IDA, windbg tips. CTF tasks and so on. Friday, March 18, 2011. Lets show you decision of T4 RusCrypto task from Ufologists. We were given an access to the box on which key container was running. It was uploaded not long ago by third party developer. Container search ended with BSOD with help of antirootkit and antiviruse. Analyze the dump and find the key in root of OS. We know for sure that flag contains only latin symbols. download file. Ok Let's see all drivers in system.