Didier Stevens: New Tool: SimpleEncoder
I needed a 010 Editor script to do ROT-47 encoding. The script I developed supports different types of simple encodings (including ROT-47):With custom shift encoding, you choose the shift value by...
View ArticleSANS Internet Storm Center, InfoCON: green: Video: De-DOSfuscation Example,...
I created a video showing how to de-obfuscate a DOSfuscated PowerShell command obtained from a maldoc I analyzed in diary entry "De-DOSfuscation Example":This is the obfuscated command:In the video, I...
View ArticleDidier Stevens: Update: format-bytes.py Version 0.0.7
In this update, I added support for “run-length encoded” ASCII dump (-A), and X and S representation for strings:format-bytes_V0_0_7.zip (https) MD5: 58D3380B48593B3497AD04ACB1719CF3 SHA256:...
View ArticleWired: Security: The Most Dangerous People on the Internet in 2018: Trump,...
From Donald Trump to Russian hackers, these are the most dangerous characters we've been watching online in 2018.
View ArticleSANS Internet Storm Center, InfoCON: green: OWASP Top 10 Internet of Things...
OWASP released "OWASP Top 10 Internet of Things 2018". "The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues...
View ArticleDidier Stevens: New Tool: msoffcrypto-crack.py
This is a new tool to recover the password of encrypted MS Office documents. I quickly put together this script to help with the analysis of encrypted, malicious documents.This tool relies completely...
View ArticleSANS Internet Storm Center, InfoCON: green: Software Crashes: A New Year's...
Recently, I experienced a couple of stop errors (also known as Blue Screen of Death) on a Windows machine, that I was able to fix with the help of NirSoft's BlueScreenView utility. With this utility, I...
View Article...And you will know me by the trail of bits: Fuzzing Like It’s 1989
With 2019 a day away, let’s reflect on the past to see how we can improve. Yes, let’s take a long look back 30 years and reflect on the original fuzzing paper, An Empirical Study of the Reliability of...
View ArticleWired: Security: The Worst Hacks of 2018: Marriott, Atlanta, Quora, and More
From the Marriott and Facebook meltdowns to state-sponsored assaults, 2018 was an eventful year for cybercrime.
View ArticleAlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...
Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...
View ArticleDidier Stevens: Overview of Content Published in December
Here is an overview of content I published in December:Blog posts:Quickpost: Developing for ESP32 with the Arduino IDEUpdate: oledump.py Version 0.0.39Release: strings.pyUpdate: rtfdump.py Version...
View ArticleSANS Internet Storm Center, InfoCON: green: Make a Wheel in 2019!, (Tue,...
I want to inspire you to take the time to create something in 2019. A program, a protocol, a policy, a howto, ... Something, anything, that brings you out of your comfort zone.It doesn't have to be...
View ArticleWired: Security: Tor Is Easier Than Ever. Time to Give It a Try
Been curious about Tor but worried it's too complicated to use? Good news: The anonymity service is more accessible than ever.
View Article...And you will know me by the trail of bits: What do La Croix, octonions,...
This year for CSAW CTF, Trail of Bits contributed two cryptography problems. In the first problem, you could combine two bugs to break DSA much like the Playstation 3 firmware hackers. The other...
View ArticleCisco Talos: Vulnerability Spotlight: Multiple privilege escalation...
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color:...
View ArticleCarnal0wnage Blog: I found a GCP service account token...now what?
Google Cloud Platform (GCP) is rapidly growing in popularity and i haven't seen too many posts on f**king it up so I'm going to do at least one :-)Google has several ways to do authentication but most...
View ArticleSANS Internet Storm Center, InfoCON: green: Gift Card Scams on the rise,...
Most people are very helpful and try to be good neighbors and citizens. This is even more prevalent with the holiday season. There are those who take advantage of the season and people's helpfulness...
View ArticleWired: Security: The Elite Intel Team Still Fighting Meltdown and Spectre
One year after a pair of devastating processor vulnerabilities were first disclosed, Intel's still dealing with the fallout.
View ArticleArsTechnica: Security Content: Bay Area: Join us 1/9 to talk about personal...
Enlarge/ Askhan Soltani has worked with the FTC and as an independent researcher, exploring data privacy issues. Recently, he testified about Facebook's privacy policies before the US and UK...
View ArticleZero in a bit: Hackers Exploit Known Google Chromecast Vulnerability in...
Starting the New Year off with a bang, Hacker Giraffe and J3ws3r reportedly exploited a vulnerability in thousands of Google Chromecast streaming devices. The CastHack bug, allegedly disclosed nearly...
View Article