Browsing All Posts filed under »fuzzing«

A new Course: “Software Exploitation via Hardware Exploitation”

January 31, 2014 by

9

For the last couple of years we’ve been teaching Practical ARM Exploitation. It’s sold out at every public offering (CanSecWest 2012 and BlackHat 2012 & 2013) and we’ve been fortunate enough to give it privately to a number of really amazing organizations. In 2011 we did a talk entitled “Hardware Hacking For Software People” at […]

SMT Solvers Summerschool at MIT

June 20, 2011 by

0

Earlier this summer Beans attended the weeklong SMT Solver Summer school held at MIT campus in Boston, Mass. Over the last few years having seen some of the presentations by Pablo Sole¬†on DEPLIB, blogposts by Sean Heelan, and having messed around a little bit with the REIL in BinNavi¬†we were really curious to get a […]

WhoHasTlb? : Extracting TypeLib data from COM Objects

September 16, 2010 by

4

So let’s say that you’re sitting down to a project (perhaps a malware analysis gig, fuzzing something, or just reversing) and you realize that most of the target is implemented in COM/ActiveX Objects. What would really help you starting off on this project is a human readable version (IDL) of the TypeLib associated with the […]