Презентация
The complexity of reversing Flutter applications
https://www.fortiguard.com/events/5403/nullcon-berlin-2024-the-complexity-of-reversing-flutter-applications
The complexity of reversing Flutter applications
https://www.fortiguard.com/events/5403/nullcon-berlin-2024-the-complexity-of-reversing-flutter-applications
FortiGuard Labs
Publications | FortiGuard Labs
Flutter is a cross-platform application development platform. With the same codebase, developers write and compile native applications for Android,...
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
https://connormcgarr.github.io/hvci/
https://connormcgarr.github.io/hvci/
Connor McGarr’s Blog
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Fuzzing IoT Devices Using the Router TL-WR902AC as Example
https://github.com/otsmr/blackbox-fuzzing
https://github.com/otsmr/blackbox-fuzzing
GitHub
GitHub - otsmr/blackbox-fuzzing: Fuzzing IoT Devices Using the Router TL-WR902AC as Example
Fuzzing IoT Devices Using the Router TL-WR902AC as Example - otsmr/blackbox-fuzzing
Fuzzing Mimikatz On Windows
https://sec-consult.com/blog/detail/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/
https://sec-consult.com/blog/detail/hack-the-hacker-fuzzing-mimikatz-on-windows-with-winafl-heatmaps-0day/
SEC Consult
Hack The Hacker – Fuzzing Mimikatz On Windows With WinAFL & Heatmaps (0day)
In this blogpost, I want to explain two topics from a theoretical and practical point of view: How to fuzz windows binaries with source code available (this part is for developers) and How to deal with big input files (aka heatmap fuzzing) and crash analysis…
Compiler Backdooring For Beginners
кратко: манипуляции с LLVM IR
https://www.youtube.com/watch?v=KgBuaHbD7GA
кратко: манипуляции с LLVM IR
https://www.youtube.com/watch?v=KgBuaHbD7GA
YouTube
Compiler Backdooring For Beginners - Marion Marschalek
Ever wondered how compiler mitigations are built? Or how a sophisticated build chain attack can target a compiler to place backdoors and other miscreants? Wonder no more, this talk shows you how to build your own compiler pass, and modify any source code…
Reversing Windows Container, episode II: Silo to Server Silo
https://blog.quarkslab.com/reversing-windows-container-part-ii-silo-to-server-silo.html
https://blog.quarkslab.com/reversing-windows-container-part-ii-silo-to-server-silo.html
Quarkslab
Reversing Windows Container, episode II: Silo to Server Silo - Quarkslab's blog
This second article describes how to convert a Silo into a Server Silo in order to create a Windows Container. In addition, it dives into certain Kernel side Silo mechanisms.
An analysis of an obfuscated JavaScript malware package
https://stacklok.com/blog/analysis-of-an-obfuscated-code-attack-on-npms-package-registry
https://stacklok.com/blog/analysis-of-an-obfuscated-code-attack-on-npms-package-registry
Stacklok
Stacklok | Simple and Secure AI Tools
Understanding the PE+ File Format - Part 4: Entry Points and TLS Callbacks
https://www.youtube.com/watch?v=9K8WaZ53oOs
https://www.youtube.com/watch?v=9K8WaZ53oOs
YouTube
Understanding the PE+ File Format - Part 4: Entry Points and TLS Callbacks
In Part 4, we focus on the PE+ file format's entry points, specifically the AddressOfEntryPoint and TLS callbacks. The video covers how to find the AddressOfEntryPoint, its role, and entry points' precedence. It also explains locating the IMAGE_TLS_DIRECTORY…
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
https://ctf.re/kernel/pcie/tutorial/dma/mmio/tlp/2024/03/26/pcie-part-2/
Reversing Engineering for the Soul
PCIe Part 2 - All About Memory: MMIO, DMA, TLPs, and more!
Diving into how PCIe devices transfer data (Part 2 of the series)
Windows Address Translation Deep Dive – Part 1
https://bsodtutorials.wordpress.com/2021/06/14/windows-address-translation-deep-dive-part-1/
https://bsodtutorials.wordpress.com/2021/06/14/windows-address-translation-deep-dive-part-1/
Machines Can Think
Windows Address Translation Deep Dive – Part 1
This is one of the most fundamental topics which you should read about while you’re debugging. The topic will be far too long to write into one post so I’m planning to split it into at …
Order of Six Angles
Unpacking VIDAR using Time-Travel Debugging (TTD) in WinDbg Preview https://www.youtube.com/watch?v=HcyCZPNO3qI
YouTube
Dr Josh Stroschein - The Cyber Yeti
You've found the Cyber Yeti! Here I host free cybersecurity educational content focused on malware analysis, reverse engineering and ethical hacking.
Ways to connect:
Twitter: https://twitter.com/jstrosch
LinkedIn: https://www.linkedin.com/in/joshstroschein/
Ways to connect:
Twitter: https://twitter.com/jstrosch
LinkedIn: https://www.linkedin.com/in/joshstroschein/
Malware Development Workshop (17 апреля, бесплатно)
https://us06web.zoom.us/webinar/register/WN_GjWVolQiRDi7zdLA9gJgWg#/registration
https://us06web.zoom.us/webinar/register/WN_GjWVolQiRDi7zdLA9gJgWg#/registration
This is a repository with sample malduck🦆 config extraction modules. By utilizing them you should be able to extract embedded configuration from unpacked malware samples of: njrat, remcos, revil, graphicalproton
https://github.com/CERT-Polska/malduck-modules
https://github.com/CERT-Polska/malduck-modules
GitHub
GitHub - CERT-Polska/malduck-modules
Contribute to CERT-Polska/malduck-modules development by creating an account on GitHub.