PDA

View Full Version : Blogs Forum


Pages : 1 [2] 3 4

  1. "Client" Unit Tests(some fun ones..)Indirect RtlCreateUserThread hooking..
  2. Several Common Ways That Viruses Spread
  3. VMware ring3 detection (RF handling)
  4. Javascript for IDA Pro
  5. Sorry its taking so long on the next release of source..
  6. Casts are bad
  7. (In My fucked up way Of thinking...)
  8. # faked Adobe PDF.SWF exploit on milw0rm
  9. # weakness of PAGE_GUARD or new Windows bug (XP/Vista 32/64 SP1)
  10. placing a "hotpatch" where it doesnt belong..
  11. why Opcode0x90's "dll Injection shield" fails against RtlCreateUserThead
  12. Pwnie Awards Nominees!!!
  13. Bypassing Csrss's hold on Terminating Win32Threads..
  14. Aslan (4514N) - Binary Code Integrator - Okaeri
  15. Generic unpacking paper revision
  16. Some graphs
  17. PAPER: Evading network-level emulation
  18. Blah
  19. Kon-Boot for USB and some news
  20. Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case)
  21. If I had a nickel for every time I had a nickel, I'd have TWO NICKELS
  22. Incoming...
  23. Presenting Kon-Boot v1.0
  24. SpiderPig Memory Tracer
  25. SpiderPig and The Childs.
  26. PAPER: Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs
  27. # IDA-Pro steals RIP ? introduction in relative addressing
  28. User-mode debugger with SoftICE UI
  29. # MS DirectShow MPEG2 (msvidctl.dll) worm was fired out!
  30. # IDA-Pro//BOCHSDBG plug-in bug: lack of 16bit support
  31. CallOutRecaptureRoutine and the changes it made
  32. # Xcon2009: passive non-resident root-kits
  33. VMprotect VM_logic (in v1.8 demo)
  34. # die Vista, die or why DEADDEEF is alive?
  35. A snippet of time.. ;) uneditted ..
  36. # IDA-Pro 5.5 has been updated, fixed ? Bochs plug-in unaligned PE bug
  37. # San-Francisco - A Dream Came True
  38. Native Blocks Pre-Alpha
  39. Server Handle Table Funtions.
  40. Ideas and concepts: behind the Sin32 Subsystem
  41. Bare Bone Client
  42. Ruby for Pentesters - The Dark Side I: Ragweed
  43. Server Thread Recycling (Beginings..)
  44. Current QuickLPC Client
  45. Current QuickLPC Server Implementation
  46. Function call graph plugin sample
  47. My first blog post.(plans for my blog)
  48. IDA Pro 5.5 and Hex-Rays 1.1 have been released!
  49. psusp
  50. Windows 7 RC syscalls
  51. # a bomb from McAfee (a nasty one)
  52. IDA Pro 5.5 goes alpha
  53. VMprotect VM_logic (in v1.8 demo)
  54. Matasano PFI (as seen on TV!)
  55. Using CreatePipe to detect and thwart Emulating Sandboxes and AV emulators
  56. EventPair Reversing, EventPairHandle as Anti-Dbg Trick
  57. Decompiling floating point
  58. IDA v5.4 demo
  59. RtlQueryProcessHeapInformation as Anti-Dbg Trick
  60. RtlQueryProcessDebugInformation as Anti-Dbg Trick
  61. Found what is that "long mode segmentation"
  62. Updated "Class Informer" plug-in
  63. Debugger tricks: Find all probable CONTEXT records in a crash dump
  64. Anti-Emulation Tricks
  65. InfoSec Institute's RE Course
  66. Examining kernel stacks on Vista/Srv08 using kdbgctrl -td
  67. VC++ asm intrinsics
  68. Ruby for Pen-Testers: Announcing Ruby Black Bag
  69. Netsons killed my Website
  70. DirecSound Capture With Deviare
  71. Understanding the kernel address space on 32-bit Windows Vista
  72. Recovering a process from a hung debugger
  73. Advanced Windows Kernel Debugging with VMWare and IDA's GDB debugger
  74. # Iím on my way to South Africa
  75. # JL/JGE Intel CPU bug as anti-reversing trick
  76. # self-replicated processes
  77. # Olly Plug-ins and MS VC
  78. # Olly loads Olly to bypass anti-attach tricks /* Clerk? trick */
  79. # anti-attach: BaseThreadStartThunk => NO_ACCESS
  80. # zombie slam
  81. # Process Explorer - bloody hell of indefinite waiting bugs
  82. # NtRequestWaitReplyPort abuses IDA-Pro
  83. # PRNG based on REP STOS
  84. # attach to me? if you can (part II)
  85. # self-overwritten REP STOS/MOVS, IDA-Pro 5.4 and Ko
  86. # try to attach to me? if you can!
  87. BITS used as a covert channel
  88. Bochs Emulator and IDA?
  89. Bochs plugin goes alpha
  90. IDA and MIPS
  91. IDA Pro has 9 debugger modules
  92. The IDA Pro book
  93. Mr. Bachaalany joins Hex-Rays
  94. Blackhat USA 2008
  95. Apple's variant of ptrace()
  96. Recon2008
  97. Kernel debugging with IDA
  98. Testing debuggers
  99. From simple to complex
  100. Bridge them all
  101. # IDA-Pro 5.4: old bugs on the new streets (was: to download or to not download)
  102. # RE course in Tel-Aviv
  103. Playstation3 / PS3 - Harddisk encryption
  104. # simple OllyScript for upx
  105. S7 airlines is under attack!
  106. # Baghdad - dead alive breakpoints
  107. # PatchDiff => Hex-Rays => WinDiff: how to analyze patches faster
  108. Class Informer IDA plug-in
  109. Windows 7 syscall list
  110. IDA v5.4 release is not that far away
  111. # shell-codes analysis: where is EP?
  112. Windows 7 kernel structures
  113. x64 SEH & Explorer Suite Update
  114. # FreeLibrary bug becomes a PE packers bug
  115. San-Francisco - the place to meet
  116. # MS VC - challenge for PE packers
  117. Unpinning Imported .dll's
  118. # chilly suspicions of new win32 bug
  119. # 3 lines C-prog hurts MS VC
  120. Malware: Unpacking Waledac
  121. # dynamic TLS callbacks instead of SEH
  122. # IDA-Pro and simple (E)SP hack
  123. # GetProcessDEPPolicy for XP/XP SP2
  124. NtSetDebugFilterState as Anti-Dbg Trick
  125. # TLS callbacks w/o USER32 (part III)
  126. # TLS callbacks w/o USER32 (part II)
  127. # another EnableTracing() bug
  128. # XP/S2K3 fails to process TLS w/o USER32
  129. # DS/FS is under hardware breakpoints
  130. IDA and TLS callbacks
  131. how powerful IDA Script might be
  132. # IDA-Pro EnableTracing() - how not to do
  133. blog was moved
  134. Guidelines to MFC reversing
  135. IOCTL-Proxy
  136. Dynamic C++ Proposal
  137. Command line version of OSR's DeviceTree
  138. Backdoor.Win32.UltimateDefender Reverse Engineering
  139. Switch as Binary Search, Part 0
  140. Switch as Binary Search, Part 1
  141. Qt Internals & Reversing
  142. CVE-2006-5758: better late than ever
  143. Malware and initial stack pointer value
  144. Shared object injection on linux/unix
  145. Bagle.W IDB
  146. Trojan.Zhelatin.pk
  147. Hotpatching MS08-067
  148. Using dual-mappings to evade automated unpackers
  149. On Analysis of Client-Server Software Applications
  150. Analyzing local privilege escalations in win32k
  151. Exploiting Tomorrow's Internet Today: Penetration testing with IPv6
  152. Can you find me now? Unlocking the Verizon Wireless xv6800 (HTC Titan) GPS
  153. VbPython 1.2a
  154. examples of the syllabuses
  155. Interesting Kernel32 Constant
  156. Analyzing Malicious PDF's
  157. The Wild World of VoIP
  158. RE-courses/conferences schedule
  159. custom gpa spy
  160. Debugger Detection Via NtSystemDebugControl
  161. POP SS and Debuggers
  162. Fighting Oreans' VM (code virtualizer flavour)
  163. PEiD imports parsing DoS
  164. Nucleus Framework
  165. SoftICE and KDExtensions
  166. IDA2PAT Reloaded
  167. Black Hat 2008 Wrap-up
  168. Part 2: Introduction to Optimization
  169. VMProtect, Part 0: Basics
  170. Part 3: Optimizing and Compiling
  171. Part 1: Bytecode and IR
  172. Inside DeleteFiber() as Anti Debug Trick
  173. Something different part 3, or not quite different
  174. Why hooking system services is more difficult (and dangerous) than it looks
  175. Inside SetUnhandledExceptionFilter
  176. Small Devices & RCE
  177. IDA on iPhone
  178. SymbolFinder
  179. Sun VirtualBox Disassembler Explantation
  180. CartellaUnicaTasse.exe Italian Malware RCE Analysis
  181. Why is secure development so important?
  182. pde/pte softice plugin
  183. Funny coded malware
  184. antisptd
  185. IceProbe - SoftIce Command Tracer
  186. build rule for x64 asm
  187. nonintrusive tracer on x64
  188. My "Unofficial" ReCon Video
  189. Strong-Name Signing, AdmiralDebilitate v0.1
  190. IDA Pro Development Environment
  191. Control Flow Deobfuscation Part 3
  192. Vmware snapshot and SSDT
  193. Phoenix Protector 1.3.0.1
  194. .NET Internals and Native Compiling
  195. Fujitsu 3D Shock Sensor Application Reversing
  196. An Introduction To .NET Reversing
  197. IDA and vmread/vmwrite x64
  198. Intel VT and cpuid break
  199. Downloader.Win32.Small or Win32/PolyCrypt Reversing
  200. #773: bug in IDA-Pro [fails to debug zero-based PE]
  201. "Function String Associate" IDA Plug-in
  202. # old CD 03 bug in windows
  203. # free IDA-Pro training
  204. # turbo-import [stealth anti-api-monitors style]
  205. # bug in Olly, Windows behavior and Peter Ferrie
  206. # thinking in IDA Pro - how to obtain a copy
  207. # bug in Process Explorer (a gift for malware)
  208. # other solutions: how to load two or more files into the same IDA-Pro database
  209. # how to load two or more files into single IDA Pro database
  210. # Syser causes BSOD
  211. # eternal life, ammo, scores in games
  212. .NET Internals and Code Injection
  213. D3DLookingGlass v0.1
  214. DisasMSIL and CFF Explorer
  215. Retsaot is Toaster, Reversed: Quick 'n Dirty Firmware Reversing
  216. My next 2 articles
  217. A brief discussion of Windows Vista’s IE Protected Mode (and user/process level secur
  218. Rebel.NET
  219. Integer overflow
  220. Control Flow Deobfuscation Part 2
  221. Programming against the x64 exception handling support, part 2: A description of the
  222. The kernel object namespace and Win32, part 1
  223. The kernel object namespace and Win32, part 2
  224. The kernel object namespace and Win32, part 3
  225. Frame pointer omission (FPO) optimization and consequences when debugging, part 1
  226. Frame pointer omission (FPO) optimization and consequences when debugging, part 2
  227. Programming against the x64 exception handling support, part 1: Definitions for x64 v
  228. Programming against the x64 exception handling support, part 3: Unwind internals (Rtl
  229. Programming against the x64 exception handling support, part 4: Unwind internals (Rtl
  230. Programming against the x64 exception handling support, part 5: Collided unwinds
  231. Programming against the x64 exception handling support, part 6: Frame consolidation u
  232. Programming against the x64 exception handling support, part 7: Putting it all togeth
  233. Debugger tricks: API call logging, the quick’n'dirty way (part 1)
  234. Debugger tricks: API call logging, the quick’n'dirty way (part 2)
  235. Debugger tricks: API call logging, the quick’n'dirty way (part 3)
  236. Few words about Kraken
  237. Useful debugger commands: .writemem and .readmem
  238. Introduction to x64 debugging, part 1
  239. Introduction to x64 debugging, part 2
  240. Introduction to x64 debugging, part 3
  241. Introduction to x64 debugging, part 4
  242. Introduction to x64 debugging, part 5
  243. x64 Debugging Review
  244. Using SDbgExt to aid your debugging and reverse engineering efforts (part 1).
  245. SDbgExt extensions - part 2.
  246. Useful WinDbg commands: .formats
  247. Beware of stack usage with the new network stack in Windows Vista
  248. Debugger commands review
  249. Debugger flow control: More on breakpoints (part 2)
  250. SDbgExt 1.09 released (support for displaying x64 EH data)