31C3 CTF: Maze write-up

This is my write-up for the maze challenge in the 31C3 CTF, that I played with the Hacking For Soju team. We “only” got 10th place (out of the 286 teams that scored any points[…]

Continue reading …

Generic DLL Proxy

On a technical level, the CIA has some fascinating abilities. And I’m not just talking about the zero-day weaknesses in about every possible device, but also the trojan capabilities. On several documents, the CIA mentions[…]

Continue reading …

Nice DLL Injection LIB

Blackbone   https://github.com/DarthTon/Blackbone Windows memory hacking library Features x86 and x64 support Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write virtual memory Process[…]

Continue reading …

CVE-2014-3153 Exploit

2014-07-03 BY JOEL ERIKSSON·7 COMMENTS This awesome vulnerability, that affect pretty much all Linux kernels from the last five years, was found by Comex about a month ago. It is also the vulnerability that is[…]

Continue reading …

Tedroo Spambot Analysis

  This is a tutorial analyzing the Tedroo spam bot. The MD5 for the binary is 37d0738dec3c65e416aec49e36db81b4. I’ve taken the binaries off the blog but send me an email ( brad _at_ reverseco (d0t) de[…]

Continue reading …