Patch Diffing with Ghidra: Using Version Tracking to Diff a LibPNG Update https://blog.threatrack.de/2019/10/02/ghidra-patch-diff/ #ghidra #reverse #dukeBarman
blog.threatrack.de
Patch Diffing with Ghidra
Carving bins - how to use #radare2 to extract some ELFs files from a raw dump http://radare.today/posts/carving-bins/ #reverse #dukeBarman
RomHack #CTF 2019 "babysh" - Defeating ASLR w/ Partial Overwrite https://www.youtube.com/watch?v=v-7Ibom0Gyo #reverse #radare2 #dukeBarman
YouTube
#9 - RomHack CTF 2019 "babysh" - Defeating ASLR w/ Partial Overwrite
Links
pwnapi: https://github.com/ndaprela/pwnapi
Vagrant box conf files: https://github.com/ndaprela/vagrant
Music
"Ice Flow" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
https://www.youtube.com/redirect?redir_…
pwnapi: https://github.com/ndaprela/pwnapi
Vagrant box conf files: https://github.com/ndaprela/vagrant
Music
"Ice Flow" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
https://www.youtube.com/redirect?redir_…
"IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software" Article: https://www.fireeye.com/blog/threat-research/2019/10/controlling-ida-pro-with-voice-control-software.html Source: https://github.com/fireeye/IDA_Pro_VoiceAttack_profile #reverse #ida #dukeBarman
GitHub
GitHub - mandiant/IDA_Pro_VoiceAttack_profile
Contribute to mandiant/IDA_Pro_VoiceAttack_profile development by creating an account on GitHub.
Our task was put up for the #HackQuest #ZeroNights. Can you solve it? https://hackquest.zeronights.org/
The IDApython cheat sheets from Pavel Rusanov are now available as PDFs https://twitter.com/angealbertini/status/1181469765552005121?s=19 #re #idapython #ida #cheatshets #vient
X (formerly Twitter)
Ange (@angealbertini) on X
The IDApython cheat sheets from Pavel Rusanov are now available as PDFs.
https://t.co/FVjvBB3eV4
https://t.co/FVjvBB3eV4
jeb2frida - Automated Frida hook generation with JEB https://github.com/Hamz-a/jeb2frida #android #dukeBarman
GitHub
GitHub - Hamz-a/jeb2frida: Automated Frida hook generation with JEB
Automated Frida hook generation with JEB. Contribute to Hamz-a/jeb2frida development by creating an account on GitHub.
find and decode all MSR/VMCS codes inside binary files https://github.com/RceNinja/Re-Scripts #reverse #ida #dukeBarman
GitHub
GitHub - RceNinja/Re-Scripts
Contribute to RceNinja/Re-Scripts development by creating an account on GitHub.
The story of Adobe Reader symbols
https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html
#re #expdev #darw1n
https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html
#re #expdev #darw1n
Blogspot
The story of Adobe Reader symbols
Posted by Mateusz Jurczyk, Project Zero Modern day security analysis of client applications is often hindered by the inaccessibility of ...
Tool for PDB generation from IDA Pro database https://github.com/Mixaill/FakePDB #reverse #ida #dukeBarman
GitHub
GitHub - Mixaill/FakePDB: Tool for PDB generation from IDA Pro database
Tool for PDB generation from IDA Pro database. Contribute to Mixaill/FakePDB development by creating an account on GitHub.
IDA Pro plugin for TileGX support https://blog.talosintelligence.com/2019/10/new-ida-pro-plugin-provides-tilegx.html #ida #dukeBarman
Cisco Talos Blog
New IDA Pro plugin provides TileGX support
Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.
#ghidra plugin for easy patch diffing source: https://github.com/threatrack/ghidra-patchdiff-correlator article: https://blog.threatrack.de/2019/10/10/ghidra-correlator/ #reverse #dukeBarman
GitHub
GitHub - threatrack/ghidra-patchdiff-correlator: This project tries to provide additional Ghidra Version Tracking Correlators suitable…
This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing. - threatrack/ghidra-patchdiff-correlator
#Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU https://github.com/beardypig/ghidra-emotionengine #reverse #dukeBarman
GitHub
GitHub - beardypig/ghidra-emotionengine: Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU
Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU - beardypig/ghidra-emotionengine
#IDA 7.4 released (Hi, Python3!) https://www.hex-rays.com/products/ida/7.4/index.shtml Hex-Rays v7.4 Decompiler Comparison Page: https://www.hex-rays.com/products/decompiler/v74_vs_v73.shtml #reverse #dukeBarman
ZeroNights 2019 HackQuest completed on October 13. It’s time to announce winners (Twitter handles):
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Introduction to the Intel Management Engine OS (series) https://pbx.sh/intelme-sw1/ #intel #reverse #me #dukeBarman
Peter Bosch’s website
Introduction to the Intel Management Engine OS (Part 1)
Examining the ME firmware version 11.0
Assembled Labeled Library for Static Analysis Research (only slides yet) https://github.com/JHUAPL/ALLSTAR #reverse #dukeBarman
GitHub
GitHub - JHUAPL/ALLSTAR: Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing…
Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries and symbols - GitHub - JHUAPL/ALLSTAR: Assembled Labeled L...
CTFZone 2019 (http://ctftime.org/event/894) jeopardy-style online quals start on November 30 and will last for 36 hours. Hurry up to register, and find out more about the rules http://ctf.bi.zone! #CTF #dukeBarman
ctftime.org
CTFZone 2019 Quals
BI.ZONE is ready to announce the date of CTFZone quals 2019!
The first online stage will take place on November 30 a...
The first online stage will take place on November 30 a...