HackDig : Dig high-quality web security articles for hackers

Inside the IOActive Silicon Lab: Reading CMOS layout

By Andrew Zonenberg @azonenbergEver wondered what happens inside the IOActive silicon lab? Forthe next few weeks we’ll be posting a series of blogs that highlight some ofthe equipment, tools, attacks, and all around interesting stuff that we dothere. We’ll start off with Andrew Zonenberg explaining the basics of CMOSlayout. Basics of CMOS L
Publish At:2016-11-19 20:15 | Read:4051 | Comments:0 | Tags:Andrew Zonenberg chip CMOS hacking microchip reverse enginee

Got 15 minutes to kill? Why not root your Christmas gift?

By Tao SauvageTP-LINKNC200 and NC220 Cloud IP Cameras, which promise to let consumers “see there,when you can’t be there,” are vulnerable to an OS command injection in the PPPoEusername and password settings. An attacker can leverage this weakness to get aremote shell with root privileges. Thecameras are being marketed for surveillance, ba
Publish At:2016-11-19 20:15 | Read:8428 | Comments:0 | Tags:authentication backdoors cloud firmware analysis firmware ha

Inside the IOActive Silicon Lab: Interpreting Images

By Andrew Zonenberg @azonenbergIn the post “ReadingCMOS layout,” we discussed understanding CMOS layout in order to reverse-engineerphotographs of a circuit to a transistor-level schematic. This was all well andgood, but I glossed over an important (and often overlooked) part of theprocess: using the photos to observe and understand the circuit&
Publish At:2016-11-19 20:15 | Read:4889 | Comments:0 | Tags:Andrew Zonenberg chip hacking CMOS hacking microchip reverse

Reverse engineering a Smarter Coffee machine for fun and a security lesson

Simone Margaritelli has done a reverse engineering of the Smarter Coffee IoT Machine Protocol to control the machine from his terminal. What is the lesson? While security industry is stressing the need to adopt a security by design approach for IoT devices, security researchers continue to find flawed and poorly designed smart objects. Clearly, such kind of
Publish At:2016-10-10 09:30 | Read:3938 | Comments:0 | Tags:Breaking News Hacking Internet of Things IoT reverse enginee

Reversing Binary: Spotting Bug without Source Code

AbstractThe proficiency to unravel the complexities of a target software is called reverse engineering or just reversing. Software attackers manipulate or break the target program functionality in an unusual way resorting to some special tools often users. This article is discussing how a security bug for instance, ‘Format String’ can be sp
Publish At:2016-09-27 09:25 | Read:5371 | Comments:0 | Tags:Reverse Engineering

Reverse Engineering With Radare2 – Part 2

Welcome back to the radare2 reversing tutorials. If you’ve missed the previous parts, you can find them here and here. Last time we’ve used the rabin2 application to view the  strings found inside the challenge01 binary to find password candidates. Based on the results we looked into the assembly to find the correct password. In this post, we’ll
Publish At:2016-08-29 14:15 | Read:21833 | Comments:0 | Tags:Uncategorized radare2 reverse engineering tutorial

Another Door to Windows | Hot Potato exploit

Microsoft Windows versions 7, 8, 10, Server 2008 and Server 2012 vulnerable to Hot Potato exploit which gives total control of PC/laptop to hackers Security researchers from Foxglove Security have discovered that almost all recent versions of Microsoft’s Windows operating system are vulnerable to a privilege escalation exploit. By chaining together a series
Publish At:2016-01-25 03:00 | Read:4354 | Comments:0 | Tags:Cyber Security Cyber Security Research Exploits Security Upd

BlackEnergy Attacking Ukraine’s Critical Infrastructures

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014 (see our previous blog posts on Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland and BlackEnergy PowerPoint Campaigns, as well as ourVirus Bulletin talk on the subject), was also active in the year 2015. ESET has r
Publish At:2016-01-10 19:25 | Read:8835 | Comments:0 | Tags:Cyber Security Cyber Security Research Cyber Warfare ICS SCA

Malware Found Inside Downed Ukrainian Grid Management Points to Cyber-attack

The Burshtyn TES power plant in Ivano-Frankivsk Oblast, Ukraine. It’s not clear if Burshtyn was affected, but power outages did affect the grid in the Ivano-Frankivsk Oblast region. Image: Raimond Spekking/Wikimedia Commons Overview On December 23, a Ukrainian power company announced that a section of the country had gone dark. This temporary outage w
Publish At:2016-01-06 06:55 | Read:8558 | Comments:0 | Tags:Cyber Security Cyber Security Research Cyber Warfare Securit

The Role of Deliberate Obfuscation for Overall Data Security and Privacy

A new book by two New York University professors offers a fresh perspective on how individuals and corporations can hide their more private information in plain sight. The book, “Obfuscation: A User’s Guide for Privacy and Protest,” surveys the more interesting historical examples of the notion and provides some interesting context for prac
Publish At:2015-11-13 15:25 | Read:4328 | Comments:0 | Tags:Data Protection Data Security Honeypot Obfuscation Privacy R

Dangerous Clipboard: Analysis of the MS15-072 Patch

This post was authored by Marcin Noga with contributions from Jaeson Schultz.Have you ever thought about how security researchers take a patch that has been released, and then reverse it to find the underlying security issue? Well, back In July Microsoft released security bulletin MS15-072, titled: “Vulnerability in Windows Graphics Component Could All
Publish At:2015-10-21 07:30 | Read:2424 | Comments:0 | Tags:Threat Research analysis MS15-072 patch reverse engineering

Reverse Engineering Virtual Machine Protected Binaries

Introduction:In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by machine that runs the program. For example, a virtual machine can support executing the ARM instruction set on a 32-bit x86 architecture. Virtual machines used in code obfuscation are completely different than common virtu
Publish At:2015-09-30 01:40 | Read:3621 | Comments:0 | Tags:Reverse Engineering

DARPA Protecting Software From Reverse Engineering Through Obfuscation

Researchers with a DARPA-led team are looking into new ways to combat reverse engineering by using obfuscation to tidy up shoddy commercial and government security.Researchers with the unit, dubbed the SafeWare program, are hoping to develop new methods, bolstered by encryption, to obscure software code in hopes it its further deployment can lead to “p
Publish At:2015-09-14 16:25 | Read:3951 | Comments:0 | Tags:Cryptography Government Vulnerabilities DARPA obfuscation re

DynamoRIO | Runtime Code Manipulation System

About DynamoRIO DynamoRIO is a runtime code manipulation system that supports code transformations on any part of a program, while it executes. DynamoRIO exports an interface for building dynamic tools for a wide variety of uses: program analysis and understanding, profiling, instrumentation, optimization, translation, etc. Unlike many dynamic tool systems,
Publish At:2015-07-28 12:00 | Read:5334 | Comments:0 | Tags:Application Security Cyber Security Cyber Security Research

Anticuckoo – A tool to detect and crash Cuckoo Sandbox.

Anticuckoo A tool to detect and crash Cuckoo Sandbox. Tested in Cuckoo Sandbox Official and Accuvant’s Cuckoo version. Reddit / netsec discussion about anticuckoo. Features Detection: Cuckoo hooks detection (all kind of cuckoo hooks). Suspicius data in own memory (without APIs, page per page scanning). Crash (Execute with arguments) (out of a sand
Publish At:2015-07-07 12:45 | Read:3610 | Comments:0 | Tags:Cyber Security Research Cyber Warfare Security Updates Tools


Share high-quality web security related articles with you:)