Create an Account
username: password:
 
  MemeStreams Logo

Security Reads's MemeStream

search

Security Reads
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Security Reads's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

sehop_en.pdf (application/pdf Object)
Topic: Technology 4:20 pm EST, Jan 25, 2010

Anti-SEHOP stuff

sehop_en.pdf (application/pdf Object)


Code coverage and BinNavi � blog.zynamics.com
Topic: Technology 4:20 pm EST, Jan 25, 2010

Code coverage and BinNavi
By Vincenzo Iozzo

I have already explained in my previous posts how much I love static analysis, nonetheless sometimes you have to get your hands dirty and use a debugger. In this post we will take a look at the BinNavi debugging APIs and how to use them to create a code coverage plugin. In this blog post I have spoken about how to use BinNavi “without BinNavi” so in order to fully understand the rest of the post it is probably better to take a look at it.

Code coverage and BinNavi � blog.zynamics.com


One Exploit Should Not Ruin Your Day « …And You Will Know me by the Trail of Bits
Topic: Technology 4:19 pm EST, Jan 25, 2010

Now that the media excitement of the aftermath of Operation Aurora has calmed down and we are all soothing ourselves to sleep by the sound of promptly applying Windows Updates, it is a good time to take a look back and try and figure out what the changing threat landscape means for real-world information security (besides Selling! More! Security! Products!) and what lessons can be learned from it.

One Exploit Should Not Ruin Your Day « …And You Will Know me by the Trail of Bits


The Trojan.Hydraq Incident: Analysis of the Aurora 0-Day Exploit | Symantec Connect
Topic: Technology 4:19 pm EST, Jan 25, 2010

You probably have heard the recent news about a widespread attack that was carried out using a 0-Day exploit for Internet Explorer as one of the vectors. This exploit is also known as the "Aurora Exploit". The code has recently gone public and it was also added to the Metasploit framework.

Analysis of 'Aurora' exploit.

The Trojan.Hydraq Incident: Analysis of the Aurora 0-Day Exploit | Symantec Connect


blackhat08.pdf (application/pdf Object)
Topic: Technology 4:18 pm EST, Jan 25, 2010

More information on return-oriented-programming to defeat security mechanisms.

blackhat08.pdf (application/pdf Object)


DEPLIB.pdf (application/pdf Object)
Topic: Technology 4:17 pm EST, Jan 25, 2010

Pablo gives a great presentation on defeating DEP through pure return-oriented-programming.

DEPLIB.pdf (application/pdf Object)


 
 
Powered By Industrial Memetics
RSS2.0