Create an Account
username: password:
 
  MemeStreams Logo

Security Reads's MemeStream

search

Security Reads
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Security Reads's topics
Arts
Business
Games
Health and Wellness
Home and Garden
(Miscellaneous)
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
Current Topic: Miscellaneous

VMMap
Topic: Miscellaneous 2:10 pm EDT, Apr  2, 2010

Introduction

VMMap is a process virtual and physical memory analysis utility. It shows a breakdown of a process's committed virtual memory types as well as the amount of physical memory (working set) assigned by the operating system to those types. Besides graphical representations of memory usage, VMMap also shows summary information and a detailed process memory map. Powerful filtering and refresh capabilities allow you to identify the sources of process memory usage and the memory cost of application features.

VMMap


HackingPDFReaders-uCon-2009.pdf (application/pdf Object)
Topic: Miscellaneous 1:51 pm EDT, Apr  2, 2010

Good PDF intro

HackingPDFReaders-uCon-2009.pdf (application/pdf Object)


Exploring Heap-Based Buffer Overflows with the Application Verifier - Security
Topic: Miscellaneous 1:30 pm EDT, Apr  2, 2010

Exploring Heap-Based Buffer Overflows with the Application Verifier

Isolating the root cause of a heap-based buffer overflow can be tricky at best. Thankfully, Microsoft provides a great tool called the Application verifier, which makes the process significantly gentler.

Exploring Heap-Based Buffer Overflows with the Application Verifier - Security


rss-hacker-research.pdf (application/pdf Object)
Topic: Miscellaneous 1:15 pm EDT, Apr  2, 2010

A look at hacking from an academic perspective.

rss-hacker-research.pdf (application/pdf Object)


Exploitation With WriteProcessMemory()
Topic: Miscellaneous 3:01 pm EDT, Mar 31, 2010

This paper introduces yet another function to defeat Windows DEP. It is
assumed that the reader is already familiar with buffer overflows on x86,
and has a basic understanding of the DEP protection mechanism. The technique
discussed in this paper is aimed at Windows XP, however, it should also work
on other Windows versions given that the attacker has some way to find the
address of the DLL, such as through a memory disclosure, etc. This paper
does not address the issue of ASLR, rather it recognizes ASLR as a
completely separate problem. The method described here is not conceptually
groundbreaking, and is ultimately only as impressive as any other ret-2-lib
technique.

Exploitation With WriteProcessMemory()


egghunt-shellcode.pdf (application/pdf Object)
Topic: Miscellaneous 7:04 pm EDT, Mar 30, 2010

Writing egghunt shellcode by hand

Matt Miller is the fucking man. End. of. story.

(Old but still informative).

egghunt-shellcode.pdf (application/pdf Object)


Etica Nicomana: (A)leatory (P)ersitent (T)hreat
Topic: Miscellaneous 4:26 pm EDT, Mar 26, 2010

(A)leatory (P)ersitent (T)hreat

Great writeup by internet badass Nico.

Etica Nicomana: (A)leatory (P)ersitent (T)hreat


ShaREing is Caring – Announcing the free BinCrowd community server « blog.zynamics.com
Topic: Miscellaneous 10:10 am EDT, Mar 26, 2010

ShaREing is Caring – Announcing the free BinCrowd community server
By Sebastian Porst

Hi everyone,

today at CanSecWest Thomas and I gave a talk where we announced the BinCrowd community server which zynamics makes available to the reverse engineering community for free. BinCrowd is a collaborative reverse engineering tool that can be used by reverse engineers to keep a repository of reverse engineered information and share this information with friends and colleagues.

ShaREing is Caring – Announcing the free BinCrowd community server « blog.zynamics.com


Hex blog: Using custom viewers from IDAPython
Topic: Miscellaneous 10:07 am EDT, Mar 26, 2010

Using custom viewers from IDAPython

Custom viewers can be used to display arbitrary textual information and can be used in any IDA plugin.They are used in IDA-View, Hex-View, Enum and struct views and the Hex-Rays decompiler.
In this blog entry we are going to write an ASM file viewer in order to demonstrate how to create a custom viewer and populate it with colored lines.

Hex blog: Using custom viewers from IDAPython


Agence nationale de la sécurité des systèmes d’information - Can you still trust your network card ?
Topic: Miscellaneous 10:00 am EDT, Mar 26, 2010

Can you still trust your network card ?
français
24 March 2010

During the CanSecWest international conference in Vancouver, members of ANSSI (French Network and Information Security Agency) described how an attacker could remotely take full control of a particular network card model.

This page gives a summary of the materials that have been presented and aims at answering questions corresponding to this presentation.

Agence nationale de la sécurité des systèmes d’information - Can you still trust your network card ?


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0