Forwarded from Ai000 Cybernetics QLab (Milad Kahsari Alhadi)
In this research paper which is first part of the system analysis series, our team at ACQL has embarked on an exploratory journey to thoroughly understand general systems concepts, aiming to extrapolate these concepts to broader system typologies. Our initial findings suggest that systems, universally, exhibit 9 fundamental characteristics. Furthermore, we identify that any entity defined as a system is susceptible to both internal and external threats, necessitating robust protective measures.
Our analysis progresses into a detailed examination of various data terminologies, along with their types and states, focusing primarily on concepts such as information and intelligence. This foundational understanding of data dynamics has enabled us to advance our study into high-level analyses of software-based systems and binaries. By doing so, we have been able to identify potential vulnerabilities within these systems. The culmination of our research involves developing strategies to exploit these identified weaknesses effectively, thereby gaining control over the systems in question.
This comprehensive approach not only enhances our understanding of system security but also contributes to the development of more secure computing environments.
ACQL Website: link
@aioooir | #analysis #acql #research
Our analysis progresses into a detailed examination of various data terminologies, along with their types and states, focusing primarily on concepts such as information and intelligence. This foundational understanding of data dynamics has enabled us to advance our study into high-level analyses of software-based systems and binaries. By doing so, we have been able to identify potential vulnerabilities within these systems. The culmination of our research involves developing strategies to exploit these identified weaknesses effectively, thereby gaining control over the systems in question.
This comprehensive approach not only enhances our understanding of system security but also contributes to the development of more secure computing environments.
ACQL Website: link
@aioooir | #analysis #acql #research
Forwarded from CyberSecurityTechnologies (-CST-)
HookChain.pdf
2 MB
#Research
"HookChain: A new perspective for Bypassing EDR Solutions", 2024.
"HookChain: A new perspective for Bypassing EDR Solutions", 2024.
👍5
Forwarded from Infosec Fortress
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
#vulnerability
#research
#vr
#conference
Video
———
🆔 @Infosec_Fortress
#vulnerability
#research
#vr
#conference
Video
———
🆔 @Infosec_Fortress
YouTube
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
If you’re interested in vulnerability research for fun or profit, or if you’re a beginner and you’re not sure how to progress, it can be difficult to sift through the firehose of technical information that’s out there. Plus there are all sorts of non-technical…
❤3👍3
Forwarded from [ deprecated_bytes ]
#reverse #IDA #hardware #research
.title
Mouse Adventures
.text
Wherein I delve into the internals of my no-name brand "Tecknet Hypertrak Gaming Mouse" in an attempt to write a cross-platform tool that can manipulate its configuration without having to use the awful Windows-only tool it's shipped with. In this first part we tear apart said tool to figure out how it communicates with the mouse.
.comment
Practical field story about "simple" hardware reverse engineering. Part 7 is noticeable as rare info about IDA's processor module creation.
.data
#1: Introduction
#2: Extracting the Firmware
#3: Writing a Disassembler
#4: Writing a custom tool
#5: Dumping and Parsing the USB Descriptors
#6: Enabling the Bootloader
#7: Writing an IDA Processor Module
#8: Dissecting the USB Code and Unbricking the Mouse
[ deprecated_bytes ]
.title
Mouse Adventures
.text
Wherein I delve into the internals of my no-name brand "Tecknet Hypertrak Gaming Mouse" in an attempt to write a cross-platform tool that can manipulate its configuration without having to use the awful Windows-only tool it's shipped with. In this first part we tear apart said tool to figure out how it communicates with the mouse.
.comment
Practical field story about "simple" hardware reverse engineering. Part 7 is noticeable as rare info about IDA's processor module creation.
.data
#1: Introduction
#2: Extracting the Firmware
#3: Writing a Disassembler
#4: Writing a custom tool
#5: Dumping and Parsing the USB Descriptors
#6: Enabling the Bootloader
#7: Writing an IDA Processor Module
#8: Dissecting the USB Code and Unbricking the Mouse
[ deprecated_bytes ]
❤3👍1