PDA

View Full Version : Blogs Forum


Pages : 1 2 3 [4]

  1. IDA and Microcontrollers
  2. Hex-Rays SDK is ready!
  3. Coordinate system for Hex-Rays
  4. Trunk, Branches, and Leaves
  5. Finally, good STL replacement?
  6. Hex-Rays beta testing is open!
  7. Adding cross references
  8. On batch analysis
  9. Dynamic coloring
  10. Very simple custom viewer
  11. Decompilation gets real
  12. Does 'return' come back?
  13. Video #5 is up.
  14. Editable Listview control
  15. IDA plugin: Extract (UnRot13) and analyze
  16. The Point-R technique
  17. Doing it without Weird Hacks (tm) is even easier
  18. imports are easy to fix
  19. New Video Tutorials website
  20. Implementing a Customer X86 Encoder
  21. Exploiting 802.11 Wireless Driver Vulnerabilities on Windows
  22. Preventing the Exploitation of SEH Overwrites
  23. Effective Bug Discovery
  24. Wars Within
  25. Fingerprinting 802.11 Implementations via Statistical Analysis of the Duration Field
  26. Improving Automated Analysis of Windows x64 Binaries
  27. Exploiting the Otherwise Non-Exploitable on Windows
  28. Locreate: An Anagram for Relocate
  29. Subverting PatchGuard Version 2
  30. Abusing Mach on Mac OS X
  31. Real-time Steganography with RTP
  32. PatchGuard Reloaded: A Brief Analysis of PatchGuard Version 3
  33. OS X Kernel-mode Exploitation in a Weekend
  34. A Catalog of Local Windows Kernel-mode Backdoor Techniques
  35. Generalizing Data Flow Information
  36. Reducing the Effective Entropy of GS Cookies
  37. Memalyze: Dynamic Analysis of Memory Access Behavior in Software
  38. Mnemonic Password Formulas
  39. GREPEXEC: Grepping Executive Objects from Pool Memory
  40. Anti-Virus Software Gone Wrong
  41. Bypassing PatchGuard on Windows x64
  42. Annoyances Caused by Unsafe Assumptions
  43. Mac OS X PPC Shellcode Tricks
  44. Social Zombies: Aspects of Trojan Networks
  45. Loop Detection
  46. Smart Parking Meters
  47. Post-Exploitation on Windows using ActiveX Controls
  48. Introduction to Reverse Engineering Win32 Applications
  49. 802.11 VLANs and Association Redirection
  50. Bypassing Windows Hardware-enforced DEP
  51. Temporal Return Addresses
  52. Windows Kernel-mode Payload Fundamentals
  53. Analyzing Common Binary Parser Mistakes
  54. Attacking NTLM with Precomputed Hashtables
  55. Linux Improvised Userland Schedular Virus
  56. FUTo
  57. Thick Clients Gone Wrong
  58. Inside Blizzard: Battle.net
  59. Funny API function inside ntdll.dll
  60. Upack
  61. Code injection
  62. How to get the Virtual Address of a PE section with IDA
  63. Finessing Import REConstructor
  64. REcon 2005
  65. Getting around anti-debugger code
  66. Forcing IDA's "Create function..." on functions containing invalid code
  67. Function Analysis
  68. When the Red Pill is Hard to Swallow
  69. Unpacking DLLs and Drivers with OllyDbg
  70. Terms of the Trade
  71. Circumventing custom SEH
  72. Using Structure Offsets as Symbolic Constants in IDA
  73. Advanced Malware Deobfuscation training course at Black Hat
  74. Loading Drivers in OllyDbg
  75. Career Shift
  76. Virus Bulletin 2006
  77. Using assembly buffers in C++ without using hex-strings
  78. Counting Lines of Source Code
  79. Investigating Outlook's Single-Instance Restriction (PART 2)
  80. Investigating Outlook's Single-Instance Restriction (PART 1)
  81. Stateless Bi-Directional Proxy
  82. stuffz
  83. ВМВаре видимо се : vmware detection
  84. Свету се немодзе угодити
  85. Making an advanced api redirection more advanced?
  86. Виртуелно, виртуелно и машински
  87. Блогујем ја, блогујеш ти....
  88. Something About Firewall Hooking and Packet Filtering #1
  89. Hello World
  90. A Framework for Hash Algorithms Analysis
  91. Something About Firewall Hooking and Packer Filtering #2
  92. hm
  93. Serials and hashing
  94. A Guide to Decompiler Design - Part 0
  95. Some words on how to decrypt trojan Ascesso
  96. First blog entry ever on Woodmann.com!