Create an Account
username: password:
 
  MemeStreams Logo

Security Reads's MemeStream

search

Security Reads
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Security Reads's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
Ten years of innovation in reverse engineering � blog.zynamics.com
Topic: Miscellaneous 9:23 am EDT, May 18, 2010

Ten years of innovation in reverse engineering
By Sebastian Porst

On our way back home from Black Hat Europe in Barcelona, Thomas and I were brainstorming about the most important changes to the field of binary code reverse engineering in the last 10 years. What has changed since then? What made the biggest impact? Remember: Back in the dark days of 2000, W32Dasm and Turbo Debugger were considered good reverse engineering tools. If you had a self-written tracer that logged the execution of conditional jumps you were basically a king.

Anyway, we came up with several trends and technologies we believe have changed the job of reverse engineers tremendously since 2000. Here they are:

Ten years of innovation in reverse engineering � blog.zynamics.com


Latvia's 'Robin Hood' hacker unmasked as AI researcher • The Register
Topic: Miscellaneous 10:35 pm EDT, May 16, 2010

Latvia's 'Robin Hood' hacker unmasked as AI researcher

Nabbed after baring fat-cat salaries

By Dan Goodin in San Francisco • Get more from this author

Posted in Crime, 14th May 2010 00:16 GMT

Latvia's 'Robin Hood' hacker unmasked as AI researcher • The Register


Errata Security: You may not need an SDL
Topic: Miscellaneous 12:07 pm EDT, May 13, 2010

Wednesday, May 12, 2010
You may not need an SDL
Posted by Robert Graham at 2:43 PM
This post at Securosis describes why Microsoft's SDL only works for Microsoft. Microsoft agrees in their own post. Both Securosis and Microsoft make fundamental errors about secure development.

Errata Security: You may not need an SDL


Errata Security: More "the air is full of packets"
Topic: Miscellaneous 12:03 pm EDT, May 13, 2010

Wednesday, May 12, 2010
More "the air is full of packets"
Posted by Robert Graham at 5:50 PM

Errata Security: More "the air is full of packets"


Ntdebugging Blog : Uncovering How Workspaces Work in WinDbg
Topic: Miscellaneous 1:48 pm EDT, May 10, 2010

Uncovering How Workspaces Work in WinDbg

Author - Jason Epperly

Workspaces have always been a little confusing to me. I knew how to bend them to do what I needed to get the job done, however they still remained a bit mysterious. Recently I decided to sort this out, just so I knew how they worked under the hood. But before I show you my investigation let's discuss the different types of workspaces. Windbg uses several built-in types including Base, User, Kernel, Remote, Processor Architecture, Per Dump, and Per Executable. It also uses named workspaces (or user defined workspaces). When you perform a particular type of debugging (e.g. live user-mode, post-mortem dump analysis etc.) these workspaces are combined into the final environment. Here's a diagram to illustrate the possible combination of workspaces.

Ntdebugging Blog : Uncovering How Workspaces Work in WinDbg


Past, Present, Future of Windows Exploitation | Abysssec Security Researches
Topic: Miscellaneous 11:06 am EDT, May  8, 2010

hi all

this is v0.1 of this post and in this post i’m going to have a review and brief history on exploitation with focus on windows .

this post will be done III part :

* part I : brief history of buffer overflow
* part II : history of windows exploitation from windows 2000 to windows 7
* part III : feature of exploitation

Past, Present, Future of Windows Exploitation | Abysssec Security Researches


OWASP_NYNJMetro_Pentesting_Flex.pdf (application/pdf Object)
Topic: Miscellaneous 10:38 am EDT, May  8, 2010

This person will be speaking at SummerCon (www.summercon.org) this year!

OWASP_NYNJMetro_Pentesting_Flex.pdf (application/pdf Object)


Immunity Debugger PeDetect and the art of signature generation | Abysssec Security Researches
Topic: Miscellaneous 4:16 pm EDT, May  6, 2010

Immunity Debugger PeDetect and the art of signature generation

Immunity Debugger PeDetect and the art of signature generation | Abysssec Security Researches


to-jt-party-at-ring0.pdf (application/pdf Object)
Topic: Miscellaneous 3:18 pm EDT, May  6, 2010

There's a party at Ring-0!

to-jt-party-at-ring0.pdf (application/pdf Object)


.NET Security Blog : Using SecAnnotate to Analyze Your Assemblies for Transparency Violations – An Example
Topic: Miscellaneous 10:10 pm EDT, May  4, 2010

Using SecAnnotate to Analyze Your Assemblies for Transparency Violations – An Example

SecAnnotate (available in the final .NET 4 SDK, and in beta form here) can be used to analyze your assemblies, especially APTCA assemblies in order to find transparency violations without needing code coverage from a test case. Instead, the static analysis provided by SecAnnotate is valuable in ensuring that your assembly is fully correct from a transparency perspective. Let’s take a look at how it might be used for a simple APTCA library.

.NET Security Blog : Using SecAnnotate to Analyze Your Assemblies for Transparency Violations – An Example


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0