#IDA 7.4 released (Hi, Python3!) https://www.hex-rays.com/products/ida/7.4/index.shtml Hex-Rays v7.4 Decompiler Comparison Page: https://www.hex-rays.com/products/decompiler/v74_vs_v73.shtml #reverse #dukeBarman
ZeroNights 2019 HackQuest completed on October 13. It’s time to announce winners (Twitter handles):
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Introduction to the Intel Management Engine OS (series) https://pbx.sh/intelme-sw1/ #intel #reverse #me #dukeBarman
Peter Bosch’s website
Introduction to the Intel Management Engine OS (Part 1)
Examining the ME firmware version 11.0
Assembled Labeled Library for Static Analysis Research (only slides yet) https://github.com/JHUAPL/ALLSTAR #reverse #dukeBarman
GitHub
GitHub - JHUAPL/ALLSTAR: Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing…
Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries and symbols - GitHub - JHUAPL/ALLSTAR: Assembled Labeled L...
CTFZone 2019 (http://ctftime.org/event/894) jeopardy-style online quals start on November 30 and will last for 36 hours. Hurry up to register, and find out more about the rules http://ctf.bi.zone! #CTF #dukeBarman
ctftime.org
CTFZone 2019 Quals
BI.ZONE is ready to announce the date of CTFZone quals 2019!
The first online stage will take place on November 30 a...
The first online stage will take place on November 30 a...
RSoC 2019 Final: Console Interface Improvements https://radareorg.github.io/blog/posts/rsoc-2019-console-interface-improvement/ #radare2 #reverse #dukeBarman
radareorg.github.io
RSoC 2019 Final: Console Interface Improvements
RSoC 2019 Final: Console Interface Improvements Introduction: Hello all, I’m deepakchethan from India. I got to work on the console interface improvements for radare2 as a part of 2019’s edition of Radare Summer of Code. My main task was to improve the terminal…
Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database https://github.com/utkonos/lst2x64dbg #reverse #ghidra #radare2 #dukeBarman
GitHub
GitHub - utkonos/lst2x64dbg: Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including…
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address. - utkonos/lst2x64dbg
ZeroNights Hackquest 2019. Results & Writeups
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
Хабр
ZeroNights Hackquest 2019. Results & Writeups
Совсем недавно завершился ежегодный HackQuest, приуроченный к конференции ZeroNights. Как и в прошлые годы, участникам предстояло решить 7 различных заданий — по одному на сутки квеста. Задания,...
ZeroNights HackQuest: Micosoft Linux (How to Solve):
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
GitHub
ctf-writeups/2019/Zeronights-Hackquest/micosoft-linux at master · icecube27/ctf-writeups
Contribute to icecube27/ctf-writeups development by creating an account on GitHub.
🔥 OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!
The C/C++ code analysis platform Joern has been resurrected!
https://medium.com/@fabs_60995/joern-reborn-f04e74399b2b
https://github.com/ShiftLeftSecurity/joern/releases #darw1n
https://medium.com/@fabs_60995/joern-reborn-f04e74399b2b
https://github.com/ShiftLeftSecurity/joern/releases #darw1n
Medium
Joern Reborn
In a blog post back in May 2018, we outlined our plans for saving the open-source C/C++ code analyzer “Joern”. Today, we are happy to…
An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis
https://github.com/toor-de-force/Ghidra-to-LLVM
#re #llvm #ghidra #darw1n
https://github.com/toor-de-force/Ghidra-to-LLVM
#re #llvm #ghidra #darw1n
GitHub
GitHub - toor-de-force/Ghidra-to-LLVM: An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis
An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis - toor-de-force/Ghidra-to-LLVM
A NTFS Bug in MFT parsing! Plug a USB key and BSOD (probably not exploitable by plug&pwn)! Microsoft WONTFIX.
https://exatrack.com/public/vuln_NTFS_EN.pdf
#re #bsod #expdev #darw1n
https://exatrack.com/public/vuln_NTFS_EN.pdf
#re #bsod #expdev #darw1n
Advancing Windows Security (PSEC 2019) https://www.platformsecuritysummit.com/2019/speaker/weston/ #windows #PSEC #videos #dukeBarman
The Evolution of Advanced Threats: REsearchers Arms Race https://www.platformsecuritysummit.com/2019/speaker/matrosov/ #hardware #PSEC #videos #dukeBarman
r2pipe script to autorename all the functions by recovering the original name from the assert statements https://gist.github.com/radare/04612d3804fa72c0cc832d06208cadaf #reverse #radare2 #dukeBarman
Gist
radare2 script to autoname functions by taking it from the assert calls
radare2 script to autoname functions by taking it from the assert calls - assnam.py
Technical analysis of the #checkm8 exploit https://habr.com/en/company/dsec/blog/472762/ #ios #exploit #dukeBarman
Habr
Technical analysis of the checkm8 exploit
Most likely you've already heard about the famous exploit checkm8, which uses an unfixable vulnerability in the BootROM of most iDevices, including iPhone X.