1. 0CTF: treasure

    We are told that there's a treasure waiting at treasure.ctf.0ops.sjtu.cn so we have to start digging!

    Firing up dig: dig treasure.ctf.0ops.sjtu.cn -t ANY tells us that the target is a IPv6 address.

    Let's do a traceroute to that address:

    $ traceroute6 treasure.ctf …
    read more
  2. Reversing JS email malware

    Another lazy Sunday (oh well, actually I should be writing papers and grant proposals but we are not talking about that right now) and I'm scrolling through my email when I stumbled upon a "FedEx notice" with your usual "you have not picked up your package" scam and I figured …

    read more
  3. 31c3 - A New Dawn

    Another year, another c3

    This year marked my 11th year of congress (and 10th visit with a short hiatus in 2012). Just like all the years before we headed to the conference location a day before the start of the 31c3. After arriving in Hamburg (after a quick detour through …

    read more
  4. 'sploits or having fun with the heap, stack, and format strings

    As part of the weekly CTF meetings we discussed some basic stack-based, heap-based, and format string based exploits. For system security challenges these are bread and butter techniques and rely on a huge amount of pre-existing knowledge about operating systems, kernels, process creation, dynamic loading, C programming, stack layouts, and …

    read more
  5. SyScan, day 2

    Breaking Anti-Virus Software: Joxean Koret

    Joxean gave a great introduction into worst security practices at anti virus companies. He basically dropped a large amount of 0days on a bunch of AV engines (I liked his opening statement "all bugs are 0days unless otherwise mentioned"). Using dumb fuzzing Joxean found a …

    read more
  6. SyScan, day 1

    Opening speech: Thomas Lim

    Thomas gave a great introduction, the conference is as big as ever and attracted a whole bunch of different people. BlackHat Asia is going to stay in Singapore, so there will be some challenges in the future. Most speakers on the other hand preferred to drop …

    read more

« Page 4 / 8 »

links

social