Introducing Kernel Data Protection, a new platform security technology for preventing data corruption https://www.microsoft.com/security/blog/2020/07/08/introducing-kernel-data-protection-a-new-platform-security-technology-for-preventing-data-corruption/ #windows #exploitation #dukeBarman
Microsoft News
Introducing Kernel Data Protection, a new platform security technology for preventing data corruption
Kernel Data Protection (KDP) is a set of APIs that provide the ability to mark some kernel memory as read-only, preventing attackers from ever modifying protected memory.
How to unc0ver a 0-day in 4 hours or less https://googleprojectzero.blogspot.com/2020/07/how-to-unc0ver-0-day-in-4-hours-or-less.html #exploitation #ios #ida #dukeBarman
projectzero.google
How to unc0ver a 0-day in 4 hours or less - Project Zero
By Brandon Azad, Project ZeroAt 3 PM PDT on May 23, 2020, the unc0ver jailbreak was released for iOS 13.5 (the latest signed version at the time of release) ...
Reverse Engineering and Patching IoT with Ghidra
Part 1: https://www.coalfire.com/The-Coalfire-Blog/April-2020/With-IoT-Common-Devices-Pose-New-Threats
Part 2: https://www.coalfire.com/The-Coalfire-Blog/April-2020/Reverse-Engineering-and-Patching-with-Ghidra
#reverse #ghidra #dukeBarman
Part 1: https://www.coalfire.com/The-Coalfire-Blog/April-2020/With-IoT-Common-Devices-Pose-New-Threats
Part 2: https://www.coalfire.com/The-Coalfire-Blog/April-2020/Reverse-Engineering-and-Patching-with-Ghidra
#reverse #ghidra #dukeBarman
Coalfire
Coalfire Blog
Resource covering the most important issues in IT security and compliance as well as insights on IT GRC issues that impact the industries that we serve.
Reversing DexGuard, Part 3 β Code Virtualization
https://www.pnfsoftware.com/blog/reversing-dexguard-virtualization/
#reverse #android #obfuscation #KosBeg
https://www.pnfsoftware.com/blog/reversing-dexguard-virtualization/
#reverse #android #obfuscation #KosBeg
Frida's Gadget Injection on Android: No Root, 2 Methods https://fadeevab.com/frida-gadget-injection-on-android-no-root-2-methods/ #android #frida #dukeBarman
Alexander Fadeev's Blog
π Frida's Gadget Injection on Android: No Root, 2 Methods
You will learn how to inject Frida's Gadget into Android application (APK) using 2 different methods without having to root your Android device.
Contract verification made easier - Symbolic execution for smart contracts https://blog.trailofbits.com/2020/07/12/new-manticore-verifier-for-smart-contracts/ #smt #dukeBarman
The Trail of Bits Blog
Contract verification made easier
Smart contract authors can now express security properties in the same language they use to write their code (Solidity) and our new tool, manticore-verifier, will automatically verify those invariants. Even better, Echidna and Manticore share the same formatβ¦
Intezer Analyze Ghidra Plugin https://github.com/intezer/analyze-community-ghidra-plugin #ghidra #malware #reverse #dukeBarman
GitHub
GitHub - intezer/analyze-community-ghidra-plugin: Ghidra plugin for https://analyze.intezer.com
Ghidra plugin for https://analyze.intezer.com. Contribute to intezer/analyze-community-ghidra-plugin development by creating an account on GitHub.
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1 https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-1 #reverse #ida #hardware #dukeBarman
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
#fuzzing #dukeBarman
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
#fuzzing #dukeBarman
GitHub
GitHub - HexHive/FuZZan: FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing - HexHive/FuZZan
WinDbg Basics for Malware Analysis https://www.youtube.com/watch?v=QuFJpH3My7A #reverse #malware #windbg #debugger #dukeBarman
YouTube
WinDbg Basics for Malware Analysis
In this tutorial we cover the basics of debugging malware with WinDbg. Expand for more...
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gβ¦
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gβ¦
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows https://github.com/microsoft/ProcMon-for-Linux #linux #dukeBarman
GitHub
GitHub - microsoft/ProcMon-for-Linux: A Linux version of the Procmon Sysinternals tool
A Linux version of the Procmon Sysinternals tool. Contribute to microsoft/ProcMon-for-Linux development by creating an account on GitHub.
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html #fuzzing #exploitation #android #dukeBarman
Blogspot
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface
Posted by Mateusz Jurczyk, Project Zero This post is the first of a multi-part series capturing my journey from discovering a vulnerable...
r2syntia (alpha stage), an integration of the program synthesis tool Syntia into #radare2, allowing to synthesize the semantics of obfuscated code https://github.com/arnaugamez/r2syntia #reverse #dukeBarman
GitHub
GitHub - arnaugamez/r2syntia: Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.
Integration of Syntia program synthesis tool into the radare2 reverse engineering framework. - arnaugamez/r2syntia
Tools to process ARM's Machine Readable Architecture Specification https://github.com/alastairreid/mra_tools #reverse #dukeBarman
GitHub
GitHub - alastairreid/mra_tools: Tools to process ARM's Machine Readable Architecture Specification
Tools to process ARM's Machine Readable Architecture Specification - alastairreid/mra_tools
The FLARE team's open-source tool to identify capabilities in executable files https://github.com/fireeye/capa #reverse #dukeBarman
GitHub
GitHub - mandiant/capa: The FLARE team's open-source tool to identify capabilities in executable files.
The FLARE team's open-source tool to identify capabilities in executable files. - mandiant/capa
Radare2 4.5.0 Codename: "Organized Chaos" released https://github.com/radareorg/radare2/releases/tag/4.5.0 Enjoy! #reverse #radare2 #dukeBarman
GitHub
Release 4.5.0 Codename: Organized Chaos Β· radareorg/radare2
Release Notes
Version: 4.5.0
Previous: 4.4.0
Commits: 426
Contributors: 58
Highlights
Analysis
Initial API for base type kinds (enum, struct, union)
Rename PowerPC to PPC
Improve RISC-V analysis f...
Version: 4.5.0
Previous: 4.4.0
Commits: 426
Contributors: 58
Highlights
Analysis
Initial API for base type kinds (enum, struct, union)
Rename PowerPC to PPC
Improve RISC-V analysis f...