Create an Account
username: password:
 
  MemeStreams Logo

Curiouser and Curiouser

search

Acidus
Picture of Acidus
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Acidus's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Cloning western technology, and getting a better result!
Topic: Technology 10:12 am EDT, Aug 10, 2007

How to Clone Anything
The easiest way to clone a product is to use a "ghost shift": A factory contracted to make legitimate goods moves to 24-hour operation, churning out copies—some made with inferior materials, and others exactly the same, designed to be sold on the black market—from midnight to morning.

The only problem with ghost shifts is that they can't run full time. In the mid-'90s, developers began constructed from the same blueprints legitimate manufacturers used to launch their ventures. Sometimes the plans were sold by managers at the genuine facilities. Other times, local officials and organized crime conspired to create a second set of blueprints.

Cloners look for opportunity first, and manufacturers often give it to them, often in the form of a hot product that is released in a limited number of markets. Desire spreads worldwide, and the cloners are ready to fill any gaps that emerge in supply or distribution. (That's what's happening now with the iPhone, which for nearly a year will be sold in North America only.)

The cloners start by deciding what phones would be most profitable to clone. They then learn everything they can about the device. They attend trade shows, furiously snapping photos of not-yet-released products until someone notices and shoos them away. They will be first in line to buy the new product whenever it hits stores. And they will look for shortcuts, such as a patent filed in China that can act as the beginning of an actual production guide.

The cloners hire a team of between 20 and 40 engineers to begin decoding the circuit boards. At the same time, coders start to develop an operating system for the phone with a similar feature set. (The typical cloner either uses off-the-shelf code, writes something entirely new, or modifies a publicly available Linux-based system.) Both processes take about a month. By then, ancillary items—plastic casings, accessories, manuals and packaging—are ready as well. Full production begins at another factory, one that is already building phones, within about eight weeks from the time the engineers are hired. After a run of about 30,000 units, the cloners move the operation to a new facility in order to avoid detection.

This is a fascinating read!

Cloning western technology, and getting a better result!


Securing Ajax Applications
Topic: Technology 9:21 am EDT, Aug  7, 2007

There is a reason this book's animal is a laughing hyena. Unfortunately, the joke's on you.


Testing for AJAX Vulnerabilities - OWASP
Topic: Technology 9:17 am EDT, Aug  7, 2007

I am half of all the references in OWASP's guide for Ajax security testing.

Testing for AJAX Vulnerabilities - OWASP


The death of a company
Topic: Technology 4:08 am EDT, Aug  2, 2007

This is the end
Beautiful friend
This is the end
My only friend, the end

Of our elaborate plans, the end
Of everything that stands, the end
No safety or surprise, the end

We gave it a great send off over the last few days. Many drinks. Many toasts. To those who aren't here, but who got us here. To those that did without to build something great. But all good things come to an end. And now it's gone.

Remember Mantra #2

Make it work. Then make it great. Then take it live. Then change the world. Then make your money. Then make it free. Then start again.


DOMinatrix - The JavaScript SQL Injector
Topic: Technology 2:05 am EDT, Jul 26, 2007

DOMinatrix is, well, incredibly awesome. It's a full automated SQL Injection tool written in JavaScript, which will dump out data from MS SQL Server databases (more to come). I'm be demoing DOMinatrix at my Black Hat presentation.

XSS + Web worm + DOMinatrix = oh crap.

In the last 5 months we've seen the development of web scanners and SQL injectors in JavaScript.

These aren't a browser exploits.
These aren't buffer overflows.
These aren't something that affects only a single browser and only on pages that don't explicitly set a character set.

This is using JavaScript in perfectly valid ways to do extremely malicious things.

There is no way to patch this.
End users are pretty much screwed.

Here is a screen shot of DOMinatrix in action.


exploitingiphone.pdf (application/pdf Object)
Topic: Technology 2:51 pm EDT, Jul 23, 2007

There toolchain development is most interesting.

exploitingiphone.pdf (application/pdf Object)


Too Racy?
Topic: Technology 2:31 pm EDT, Jul 23, 2007

Billy,

I submitted your title to the Conference Advisory Board and we were hoping you could possibly re-phrase the “Premature AJAX-ulation” references. While some of us appreciate the play on words, we have a feeling it would not be well received by all and we do not wish to offend anyone.


The SPI laboratory : SPI Labs advises avoiding iPhone feature
Topic: Technology 11:39 am EDT, Jul 17, 2007

The Apple iPhone’s Safari web browser has a special feature that allows the user to dial any phone number displayed on a web page simply by tapping the number. SPI Labs has discovered that this feature can be exploited by attackers to perform various attacks, including:

* Redirecting phone calls placed by the user to different phone numbers of the attacker’s choosing
* Tracking phone calls placed by the user
* Manipulating the phone to place a call without the user accepting the confirmation dialog
* Placing the phone into an infinite loop of attempting calls, through which the only escape is to turn off the phone
* Preventing the phone from dialing

These types of attacks can be launched from a malicious website, from a legitimate website that has Cross-Site Scripting vulnerabilities, or as part of a payload of a web application worm.

For example, an attacker could determine that a specific website visitor “Bob” has called an embarrassing number such as an escort service. An attacker can also trick or force Bob into dialing any other telephone number without his consent such a 900-number owned by the attacker or an international number. Finally, an attacker can lock Bob’s phone forcing Bob to either make the call or hard-reset his phone resulting in possible data loss.

Told you it would mention an escort service.

The SPI laboratory : SPI Labs advises avoiding iPhone feature


Generic Http Handers in ASP.NET
Topic: Technology 4:25 pm EDT, Jul 10, 2007

Today I finally got the memo about the joy that is Generic Handlers in ASP.NET. These things are a great way to emulate PHP-style webservices and Ajax callbacks.


Tokenizers/Parsers
Topic: Technology 4:32 pm EDT, Jul  5, 2007

Literals are a pain to tokenize, especially when the literal can start with a valid math operator. I'm looking at you JavaScript Regex Literal and signed integer literals! You broke my code.

var x = /123/;
var y =5 /2;
z(5,+54.1, -13);

This is where you can blur the line between what the tokenizer should do and what the parser does. Going the wrong way makes things bad. Like, crashing bad.


(Last) Newer << 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 ++ 23 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0