Quantcast
Channel: eternal-todo.com aggregator
Browsing all 12054 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Didier Stevens: New Tool: SimpleEncoder

I needed a 010 Editor script to do ROT-47 encoding. The script I developed supports different types of simple encodings (including ROT-47):With custom shift encoding, you choose the shift value by...

View Article


Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Video: De-DOSfuscation Example,...

I created a video showing how to de-obfuscate a DOSfuscated PowerShell command obtained from a maldoc I analyzed in diary entry "De-DOSfuscation Example":This is the obfuscated command:In the video, I...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: Update: format-bytes.py Version 0.0.7

In this update, I added support for “run-length encoded” ASCII dump (-A), and X and S representation for strings:format-bytes_V0_0_7.zip (https) MD5: 58D3380B48593B3497AD04ACB1719CF3 SHA256:...

View Article

Wired: Security: The Most Dangerous People on the Internet in 2018: Trump,...

From Donald Trump to Russian hackers, these are the most dangerous characters we've been watching online in 2018.

View Article

SANS Internet Storm Center, InfoCON: green: OWASP Top 10 Internet of Things...

OWASP released "OWASP Top 10 Internet of Things 2018". "The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues...

View Article


Image may be NSFW.
Clik here to view.

Didier Stevens: New Tool: msoffcrypto-crack.py

This is a new tool to recover the password of encrypted MS Office documents. I quickly put together this script to help with the analysis of encrypted, malicious documents.This tool relies completely...

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Software Crashes: A New Year's...

Recently, I experienced a couple of stop errors (also known as Blue Screen of Death) on a Windows machine, that I was able to fix with the help of NirSoft's BlueScreenView utility. With this utility, I...

View Article

...And you will know me by the trail of bits: Fuzzing Like It’s 1989

With 2019 a day away, let’s reflect on the past to see how we can improve. Yes, let’s take a long look back 30 years and reflect on the original fuzzing paper, An Empirical Study of the Reliability of...

View Article


Wired: Security: The Worst Hacks of 2018: Marriott, Atlanta, Quora, and More

From the Marriott and Facebook meltdowns to state-sponsored assaults, 2018 was an eventful year for cybercrime.

View Article


Image may be NSFW.
Clik here to view.

AlienVault Blogs: How Malware Sandboxes and SIEMs Work in Tandem to...

Rohan Viegas of VMRay explains some of the key factors IT security teams should consider when evaluating a malware analysis sandbox and whether it’s a good fit for their existing SIEM environment. He...

View Article

Didier Stevens: Overview of Content Published in December

Here is an overview of content I published in December:Blog posts:Quickpost: Developing for ESP32 with the Arduino IDEUpdate: oledump.py Version 0.0.39Release: strings.pyUpdate: rtfdump.py Version...

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Make a Wheel in 2019!, (Tue,...

I want to inspire you to take the time to create something in 2019. A program, a protocol, a policy, a howto, ... Something, anything, that brings you out of your comfort zone.It doesn't have to be...

View Article

Wired: Security: Tor Is Easier Than Ever. Time to Give It a Try

Been curious about Tor but worried it's too complicated to use? Good news: The anonymity service is more accessible than ever.

View Article


Image may be NSFW.
Clik here to view.

...And you will know me by the trail of bits: What do La Croix, octonions,...

This year for CSAW CTF, Trail of Bits contributed two cryptography problems. In the first problem, you could combine two bugs to break DSA much like the Playstation 3 firmware hackers. The other...

View Article

Image may be NSFW.
Clik here to view.

Cisco Talos: Vulnerability Spotlight: Multiple privilege escalation...

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color:...

View Article


Image may be NSFW.
Clik here to view.

Carnal0wnage Blog: I found a GCP service account token...now what?

Google Cloud Platform (GCP) is rapidly growing in popularity and i haven't seen too many posts on  f**king it up so I'm going to do at least one :-)Google has several ways to do authentication but most...

View Article

Image may be NSFW.
Clik here to view.

SANS Internet Storm Center, InfoCON: green: Gift Card Scams on the rise,...

Most people are very helpful and try to be good neighbors and citizens.  This is even more prevalent with the holiday season.  There are those who take advantage of the season and people's helpfulness...

View Article


Wired: Security: The Elite Intel Team Still Fighting Meltdown and Spectre

One year after a pair of devastating processor vulnerabilities were first disclosed, Intel's still dealing with the fallout.

View Article

Image may be NSFW.
Clik here to view.

ArsTechnica: Security Content: Bay Area: Join us 1/9 to talk about personal...

Enlarge/ Askhan Soltani has worked with the FTC and as an independent researcher, exploring data privacy issues. Recently, he testified about Facebook's privacy policies before the US and UK...

View Article

Image may be NSFW.
Clik here to view.

Zero in a bit: Hackers Exploit Known Google Chromecast Vulnerability in...

Starting the New Year off with a bang, Hacker Giraffe and J3ws3r reportedly exploited a vulnerability in thousands of Google Chromecast streaming devices. The CastHack bug, allegedly disclosed nearly...

View Article
Browsing all 12054 articles
Browse latest View live