Writing a Hyper-V “Bridge” for Fuzzing — Part 1: WDF http://www.alex-ionescu.com/?p=377 #fuzzing #hypervisor #dukeBarman
UEFI vulnerabilities classification focused on BIOS implant delivery https://medium.com/@matrosov/uefi-vulnerabilities-classification-4897596e60af #uefi #dukeBarman
Medium
UEFI vulnerabilities classification focused on BIOS implant delivery
Tons of research has been already presented about problems in UEFI firmware ecosystem and how relatively easy deliver and install…
The Last Line of Defense: Understanding and Attacking Apple File System on iOS https://bxl1989.github.io/2019/01/17/apfs-remount.html #ios #dukeBarman
bxl1989.github.io
The Last Line of Defense: Understanding and Attacking Apple File System on iOS | Xiaolong Bai's security research blog
A RW root partition is important for jailbreaks due to a need of installing unsandboxed programs and modifying system settings. Basically, root filesystem on...
IDA Dynamic Data Resolver (DDR) - IDA Plugin (use DynamoRIO) Article: https://blog.talosintelligence.com/2019/01/ddr.html Github: https://github.com/Cisco-Talos/DynDataResolver #reverse #ida #dukeBarman
Cisco Talos Blog
Dynamic Data Resolver (DDR) - IDA Plugin
Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.
KRF is a Kernelspace Randomized Faulter for the Linux kernel - https://blog.trailofbits.com/2019/01/17/how-to-write-a-rootkit-without-really-trying/ #antirootkit #linux #dukeBarman
The Trail of Bits Blog
How to write a rootkit without really trying
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux…
Power trace simulator using Unicorn Engine for side channel analysis attack testing https://github.com/jevinskie/emusca #unicorn #sidechannel #dukeBarman
GitHub
GitHub - jevinskie/emusca: Power trace simulator using Unicorn Engine for side channel analysis attack testing
Power trace simulator using Unicorn Engine for side channel analysis attack testing - jevinskie/emusca
Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi: from zero knowledge to zero-click RCE https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/ #hardware #wifi #pwn #dukeBarman
A collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially documented and cannot be found in Windows Driver Kit (WDK) headers. The target audience of this site is driver developers and kernel researches
https://www.vergiliusproject.com #windev #kernel #darw1n
https://www.vergiliusproject.com #windev #kernel #darw1n
JEB Native Analysis Pipeline – Part 2: IR Optimizers
https://www.pnfsoftware.com/blog/jeb-native-pipeline-ir-optimizers-part-2/ #ir #obfuscation #re #malware #KosBeg
https://www.pnfsoftware.com/blog/jeb-native-pipeline-ir-optimizers-part-2/ #ir #obfuscation #re #malware #KosBeg
Rellic produces goto-free C output from LLVM bitcode https://github.com/trailofbits/rellic #reverse #llvm #dukeBarman
GitHub
lifting-bits/rellic
Rellic produces goto-free C output from LLVM bitcode - lifting-bits/rellic
Xendbg: A Full-Featured Debugger for the Xen Hypervisor Article: https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/january/xendbg-a-full-featured-debugger-for-the-xen-hypervisor/ Source: https://github.com/nccgroup/xendbg #xen #debugger #dukeBarman
GitHub
GitHub - nccgroup/xendbg: A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues…
A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermichaels/xendbg. - GitHub - nccgroup/xendbg: A feature-complet...
Attention! Soon, our forum will be transferred to a new engine. Therefore all passwords will be reset.
Due to this we ask you to check the relevance of your email, to which your accounts are linked, if you want to keep access to them.
—-
Внимание! В скором времени, наш форум будет переведен на новый движок. Поэтому все пароли будут сброшены.
В связи с этим, мы просим вас проверить актуальность ваших email, к которым привязаны ваши аккаунты, если вы хотите сохранить к ним доступ.
Due to this we ask you to check the relevance of your email, to which your accounts are linked, if you want to keep access to them.
—-
Внимание! В скором времени, наш форум будет переведен на новый движок. Поэтому все пароли будут сброшены.
В связи с этим, мы просим вас проверить актуальность ваших email, к которым привязаны ваши аккаунты, если вы хотите сохранить к ним доступ.
Защита микросхем от реверс-инжиниринга и несанкционированного проникновения https://habr.com/ru/post/436998/ #hardware #dukeBarman
Хабр
Защита микросхем от реверс-инжиниринга и несанкционированного проникновения
“CVAX — когда вы забатите довольно воровать настоящий лучший”. Надпись, оставленная американскими инженерами для советских коллег в топологии микропроцессора. Реверс-инжиниринг микросхем — головная...