Blog Archives

The Adobe Source Code Breach

Adobe logo
http://gl.ib.ly/wp-content/uploads/2013/10/adobe-logo-150x150.jpgDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

It seems that a code breach bunch of people ran off with the Adobe Source Code. It is a disaster for the company not just for the IP theft but has sweeping security implications for all users of Adobe software —

http://gl.ib.ly/wp-content/uploads/2013/10/adobe-logo-150x150.jpgDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , ,
Posted in Security

Paranoia deepens for security people as hardware trojans cloak

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

I remember being back in college writing little trojans for windows and linux. Hardware trojans troubled one of my lecturers. He had been paranoid, for a great number of years, about the complexity of computer chips and during one such

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , , , , ,
Posted in Security

Ann skips bail. Cue forensics puzzle.

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

Found a website and a forensics contest yesterday quite by accident. I was waiting for somebody before going out for the night and I thought this might be a little fun while I waited. Now the contest had closed and

Save on DeliciousDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , ,
Posted in Computing, Security

Analysing the byte entropy of a FAT formatted disk

Zoomed up entropy graph of image
http://gl.ib.ly/wp-content/uploads/2009/01/image_0t120.ent_-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

Over at the Honeynet Project they used to run security competitions which were quite a bit of fun. I remembered one in particular which I looked at but hadn’t completed. It dealt with the forensic investigation of a floppy disk. I was tinkering

http://gl.ib.ly/wp-content/uploads/2009/01/image_0t120.ent_-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , , , ,
Posted in Security

Adding a malicious system call to the Linux kernel – Rootkit

00000244
http://gl.ib.ly/wp-content/uploads/2014/05/00000244-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter

Introduction Today I am adding a malicious system call to the Linux kernel which will allow the caller to do something they cannot normally do in user mode. When attacking a Linux box our goal is usually to become root;

http://gl.ib.ly/wp-content/uploads/2014/05/00000244-150x150.pngDigg This
Share on Facebook+1Share on LinkedInPin it on PinterestSubmit to redditSubmit to StumbleUponShare on TumblrShare on Twitter
Tagged with: , , , , , , , ,
Posted in Security