Topics: PCI-based DMA Attack. #hardware #exploit
https://github.com/carmaa/inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe HW interfaces.
https://github.com/carmaa/inception
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe HW interfaces.
GitHub
GitHub - carmaa/inception: Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can…
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. - carm...
Topics: Exploits, Google Chrome. #exploit #reversing
Chrome in-the-wild bug analysis: CVE-2021-30632.
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_30632/
Chrome in-the-wild bug analysis: CVE-2021-30632.
https://securitylab.github.com/research/in_the_wild_chrome_cve_2021_30632/
Practical C++ Decompilation.pdf
794 KB
Topics: C++ Decompilation. #reversing #cpp
This pdf is useful if you want to understand the C++ structure in a low-level perspective, also it will help you when reverse engineering C++ applications.
This pdf is useful if you want to understand the C++ structure in a low-level perspective, also it will help you when reverse engineering C++ applications.
Project_Zero_Exploiting_the_DRAM_rowhammer_bug_to_gain_kernel_privileges.pdf
2.4 MB
Topics: DRAM Rowhammer. #hardware #hacking
In this article they use the rowhammer to gain kernel privileges. The idea is to
In this article they use the rowhammer to gain kernel privileges. The idea is to
mmap() a large block of memory and search for addresses where bits are flipped, then spray the physical memory with page tables in order to make the PTE's physical page number point to their process, and hammer the aggressor addresses.
p.file
Project_Zero_Exploiting_the_DRAM_rowhammer_bug_to_gain_kernel_privileges.pdf
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
827.9 KB
The repeated toggling of a row's wordline can disturb nearby cells and make them lose charge, if a cell loses too much charge before it is restored, it experiences a disturbance error. The following code is used to disturb the cells:
code1a:
mov (X), %eax
mov (Y), %ebx
clflush (X) // See Vol 3 11.5.5clflush (Y)
mfence // Not used in the Google's article.
jmp code1a
p.file
Flipping_Bits_in_Memory_Without_Accessing_Them_An_experimental_Study.pdf
In this structure, when the access transistor is turned on by applying a voltage on the gate of the access transistor, a voltage representing the data value is placed onto the bitline and charges the storage capacitor. The storage capacitor then retains the stored charge after the access transistor is turned off and the voltage on the wordline is removed. However, the electrical charge stored in the storage capacitor will gradually leak away with the passage of time. To ensure data integrity, the stored data value in the DRAM cell must be periodically read out and written back by the DRAM device in a process known as refresh.
From Memory Systems: Cache, DRAM, Disk.
From Memory Systems: Cache, DRAM, Disk.
image_2021-10-31_02-48-13.png
363.6 KB
Topics: Embedded Engineer Roadmap. #roadmap #comp_arch #hardware
Source: https://github.com/vazeri/Embedded-Engineering-RoadMap-2018
Source: https://github.com/vazeri/Embedded-Engineering-RoadMap-2018
image_2021-10-31_15-19-27.png
848.1 KB
Topics: Reverse Engineering Roadmap. #roadmap #hacking #reversing
Source: https://t.iss.one/c/1271381651/1765
Source: https://t.iss.one/c/1271381651/1765
Topics: Math, Integrals. #math
Original integral-table.com web page.
https://github.com/biomathman/integral-table.com
Original integral-table.com web page.
https://github.com/biomathman/integral-table.com
GitHub
GitHub - biomathman/integral-table.com: Original integral-table.com web page
Original integral-table.com web page. Contribute to biomathman/integral-table.com development by creating an account on GitHub.
Topics: Exploit. #exploit #reversing
Exploiting Grandstream HT801 ATA (CVE-2021-37748, CVE-2021-37915).
https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/
Exploiting Grandstream HT801 ATA (CVE-2021-37748, CVE-2021-37915).
https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/
www.secforce.com
Exploiting Grandstream HT801 ATA (CVE-2021-37748, CVE-2021-37915)
This article describes two authenticated remote code execution vulnerabilities that we found during a time-bounded security assessment of Grandstream’s HT801 Analog Telephone Adapter. Both vulnerabilities are exploitable via the limited configuration shell…
Forwarded from A paranoid man makes paranoid plans
Designing_BSD_Rootkits_An_Introduction_to_Kernel_Hacking_by_Joseph.pdf
8.4 MB
Forwarded from Freestanding
Forth_Encyclopedia_The_Complete_Forth_Programmers_Manual_by_Mitch.pdf
4.3 MB