Browsing Archives of Author » «

Power Analysis with Riscure

February 11, 2014

0

Meeting Riscure Last year Ridley and I presented at Infiltrate 2013.  I’ve been going since the conference started and it’s pretty awesome actually.  While we were there we saw this amazing talk by this guy Jasper van Woudenberg “Hardware Sidechannel Attacks and Fault Injections.” Some other guys and I commented on how awesome it was, […]

ARM Exploitation: Switzerland

March 21, 2013

1

Late last year we got an email from Paul Such (the founder of SCRT Information Security) inviting us to present and lead a workshop at the Insomni’hack 2013 conference.  A workshop is like a 1-day, mini-training.  The conference is a two-track one day conference with workshops beforehand, and an all-night hacking contest and CTF afterwards. Maybe this […]

INFILTRATE 2011

July 27, 2011

0

Beans recently (okay, it was MONTHS ago and I had this post pending in review since then) attended the Immunity INFILTRATE Conference in South Beach Miami, as well as the MASTER CLASS HACKING TRAINING.  Unfortunately this Stephen rarely (if ever) takes photos of anything, so you won’t see pictures of Internet superstar hackers here. Instead […]

Disassembling BlackBerry apps, take 2

February 19, 2009

51

A couple people brought to my attention that the coddec patch, well, doesn’t work.  And they were right!   I just committed a new  patch which should work.  Also, provided here are hopefully some instructions to get this working: Download coddec.rar from wherever Extract into some directory and cd into the directory patch -p1 < coddec.patch […]

Disassembling Version 6 BlackBerry apps

January 7, 2009

13

Now and again I have to disassemble BlackBerry apps.  BlackBerries pretty much run all Java code.  You might think this would mean everything was .class files and you could jad everything, but this is not the case.  Everything gets compiled to “.cod” files, a file format I have found very little information about on the […]

reversing the ms08-067 patch…

October 23, 2008

1

We are gonna jump right in here: First, let’s download patches. MS has supplied patches for 2K. Since 2K is the older, less featureful of any of the operating systems, we should download those patches in order to gain insight into the vulnerability. First, I grabbed the patch from http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx. I noted that it “replaced” […]