«
Expand/Collapse
17 items tagged "internals"
Related tags:
hacks [+],
windows [+],
toy [+],
structure member [+],
structure [+],
richard johnson tags [+],
ida pro [+],
ida [+],
hacking [+],
disassembler [+],
chaos communication congress [+],
black hat [+],
analysis algorithms [+],
vista [+],
slides [+],
michael muckin [+],
magazine [+],
issue [+],
hacking windows [+],
clubhack [+],
cesar cerrudo [+],
attack strategies [+],
wwii [+],
wrist exerciser [+],
video windows [+],
video dissection [+],
uncrippling [+],
teachable moments [+],
sprite [+],
sound quality [+],
sketch art [+],
sketch [+],
sennheiser [+],
security [+],
scott nietfeld [+],
scott [+],
ridiculous [+],
review [+],
phrase [+],
pc. by [+],
mug [+],
model [+],
macbook [+],
linksys wrt54g [+],
laptops [+],
kindle [+],
keypad [+],
keyboard pc [+],
jim [+],
interesting stuff [+],
home [+],
hinge [+],
gyroscopic devices [+],
game [+],
exerciser [+],
etch a sketch [+],
etch [+],
ereader [+],
entertainment [+],
enigma machine [+],
eevblog [+],
disk [+],
digital [+],
desktop [+],
dave [+],
custom word [+],
child [+],
charger [+],
cellphones [+],
catch phrase game [+],
catch [+],
brandon meyer [+],
bart [+],
audio windows [+],
audio [+],
arduino [+],
air [+]
-
-
6:20
»
SecDocs
-
-
21:41
»
SecDocs
Authors:
Richard Johnson Tags:
reverse engineering Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Disassembler Internals II is an advanced look at the power of programmatic disassembly analysis. The talk will focus on data structure recognition for the purposes of reducing time spent reverse engineering protocols and proprietary file formats. Disassembler Internals II is an advanced look at programmatic disassembly analysis with a focus on data structure recognition. The original Disassember Internals presentation given at Toorcon 7 discussed the basic concepts required to build a high-level disassembler. These topics included binary format parsing, opcode disassemblers, and elementary disassembly analysis algorithms for indentifying relationships within the code. These topics will be reintroduced to bring attendees up to speed, and Disassembler Internals II will take the audience to the next level with a discussion of techniques for programmatically recognizing data structures. The ability to properly identify high-level data structures is crucial in the process of reverse-engineering. General structure recognition is accomplished by tracking references to offsets within a known set of data. Depending on the complexity of the assembly code, a great percentage of fields can be immediately identified, reducing the amount tedious manual labor required when reversing a protocol or file format. Given advanced disassembler tools with cross- referencing abilities, tracking variables and examining the transfer of pointers from one location to another to identify high-level objects is fully attainable through static binary analysis. A view of how the program interacts with supplied data can be analyzed to determine memory allocation for structures, structure member data-types, and potential flaws in structure parsing code. This sort of analysis can be rapidly prototyped with IDA Pro and developed further as desired in custom reverse-engineering tools. Finally, the presentation will discuss the usefulness of the concepts when applied to automated vulnerability discovery. The category of vulnerability discovery tools known as "fuzzers" can benefit greatly from the ability to automatically determine the structure of the data being manipulated. Fuzzers can be used to rapidly determine parsing errors in protocols and file formats. There are generally two approaches to software fuzzing: random manipulation of a valid dataset or using pre-defined protocol templates. The latter approach is typically more effective, but requires substantial effort to construct a protocol template that is useful for the fuzzer. The combination of fuzzing technology and algorithms for automatic protocol template generation will lead to intelligent fuzzers that are more effective at finding vulnerabilities. The presentation will conclude with a demonstration and release of a standalone console disassembler/analyzer for PE and ELF binaries and an IDA plugin capable of identifying structures in code.
-
21:41
»
SecDocs
Authors:
Richard Johnson Tags:
reverse engineering Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Disassembler Internals II is an advanced look at the power of programmatic disassembly analysis. The talk will focus on data structure recognition for the purposes of reducing time spent reverse engineering protocols and proprietary file formats. Disassembler Internals II is an advanced look at programmatic disassembly analysis with a focus on data structure recognition. The original Disassember Internals presentation given at Toorcon 7 discussed the basic concepts required to build a high-level disassembler. These topics included binary format parsing, opcode disassemblers, and elementary disassembly analysis algorithms for indentifying relationships within the code. These topics will be reintroduced to bring attendees up to speed, and Disassembler Internals II will take the audience to the next level with a discussion of techniques for programmatically recognizing data structures. The ability to properly identify high-level data structures is crucial in the process of reverse-engineering. General structure recognition is accomplished by tracking references to offsets within a known set of data. Depending on the complexity of the assembly code, a great percentage of fields can be immediately identified, reducing the amount tedious manual labor required when reversing a protocol or file format. Given advanced disassembler tools with cross- referencing abilities, tracking variables and examining the transfer of pointers from one location to another to identify high-level objects is fully attainable through static binary analysis. A view of how the program interacts with supplied data can be analyzed to determine memory allocation for structures, structure member data-types, and potential flaws in structure parsing code. This sort of analysis can be rapidly prototyped with IDA Pro and developed further as desired in custom reverse-engineering tools. Finally, the presentation will discuss the usefulness of the concepts when applied to automated vulnerability discovery. The category of vulnerability discovery tools known as "fuzzers" can benefit greatly from the ability to automatically determine the structure of the data being manipulated. Fuzzers can be used to rapidly determine parsing errors in protocols and file formats. There are generally two approaches to software fuzzing: random manipulation of a valid dataset or using pre-defined protocol templates. The latter approach is typically more effective, but requires substantial effort to construct a protocol template that is useful for the fuzzer. The combination of fuzzing technology and algorithms for automatic protocol template generation will lead to intelligent fuzzers that are more effective at finding vulnerabilities. The presentation will conclude with a demonstration and release of a standalone console disassembler/analyzer for PE and ELF binaries and an IDA plugin capable of identifying structures in code.
-
2:56
»
SecDocs
Authors:
Richard Johnson Tags:
reverse engineering Event:
Chaos Communication Congress 22th (22C3) 2005 Abstract: Disassembler Internals II is an advanced look at the power of programmatic disassembly analysis. The talk will focus on data structure recognition for the purposes of reducing time spent reverse engineering protocols and proprietary file formats. Disassembler Internals II is an advanced look at programmatic disassembly analysis with a focus on data structure recognition. The original Disassember Internals presentation given at Toorcon 7 discussed the basic concepts required to build a high-level disassembler. These topics included binary format parsing, opcode disassemblers, and elementary disassembly analysis algorithms for indentifying relationships within the code. These topics will be reintroduced to bring attendees up to speed, and Disassembler Internals II will take the audience to the next level with a discussion of techniques for programmatically recognizing data structures. The ability to properly identify high-level data structures is crucial in the process of reverse-engineering. General structure recognition is accomplished by tracking references to offsets within a known set of data. Depending on the complexity of the assembly code, a great percentage of fields can be immediately identified, reducing the amount tedious manual labor required when reversing a protocol or file format. Given advanced disassembler tools with cross- referencing abilities, tracking variables and examining the transfer of pointers from one location to another to identify high-level objects is fully attainable through static binary analysis. A view of how the program interacts with supplied data can be analyzed to determine memory allocation for structures, structure member data-types, and potential flaws in structure parsing code. This sort of analysis can be rapidly prototyped with IDA Pro and developed further as desired in custom reverse-engineering tools. Finally, the presentation will discuss the usefulness of the concepts when applied to automated vulnerability discovery. The category of vulnerability discovery tools known as "fuzzers" can benefit greatly from the ability to automatically determine the structure of the data being manipulated. Fuzzers can be used to rapidly determine parsing errors in protocols and file formats. There are generally two approaches to software fuzzing: random manipulation of a valid dataset or using pre-defined protocol templates. The latter approach is typically more effective, but requires substantial effort to construct a protocol template that is useful for the fuzzer. The combination of fuzzing technology and algorithms for automatic protocol template generation will lead to intelligent fuzzers that are more effective at finding vulnerabilities. The presentation will conclude with a demonstration and release of a standalone console disassembler/analyzer for PE and ELF binaries and an IDA plugin capable of identifying structures in code.
-
-
16:01
»
Hack a Day
[Jim's] pretty serious about his Etch a Sketch. He’s gone to the trouble of building a rig that will automatically render a photograph as Etch a Sketch art. Do you recognize the US political figure being plotted in this image? He actually cracks these open and removes all of the internals to preserve the artwork [...]
-
-
8:14
»
Packet Storm Security Recent Files
ClubHACK Magazine Issue 15 - Topics covered include Mozilla Firefox Internals and Attack Strategies, FireCAT, Being Invisible on the Internet, and more.
-
8:14
»
Packet Storm Security Misc. Files
ClubHACK Magazine Issue 15 - Topics covered include Mozilla Firefox Internals and Attack Strategies, FireCAT, Being Invisible on the Internet, and more.
-
-
8:02
»
Hack a Day
This toy has some upgraded internals that turn it into an Enigma machine. We absolutely love the idea, as it takes a toy that your child may have grown out of, and uses it to provide teachable moments dealing with both history and mathematics. But who are we kidding? We want to make one just [...]
-
-
11:30
»
Hack a Day
It looks like this low-end Sennheiser HD speaker has the same internals as it’s better-brother but has been altered to reduce sound quality. It’s not uncommon for manufacturers to hobble a product in order to sell more units at a lower price that reflects less features. Linksys WRT54G routers immediately come to mind, or perhaps [...]
-
-
9:43
»
Hack a Day
[Scott Nietfeld] built a charger from a Dyna-flex wrist exerciser. We hadn’t heard of a these gyroscopic devices before but once we saw the promo video (embedded after the break) we realized that this is the kind of thing that infomercials were made to sell. [Scott] knew the internals spun to fairly high RPM and [...]
-
-
10:51
»
Hack a Day
[Dave] over at the EEVblog did a review of the kindle 3 recently, but never got to the good stuff, the guts. He is now rectifying this with a full video dissection of the eReader. Full of details on how to open it up as well as specifics on the internals, this is a fun [...]
-
-
9:56
»
Hack a Day
Our friend [Sprite_TM] took a look at the security of a code-protected hard disk. The iStorage diskGenie is an encrypted USB hard drive that has a keypad for passcode entry. After cracking it open he found that the chip handling the keypad is a PIC 16F883 microcontroller. He poked and prodded at the internals and found some interesting stuff. [...]
-
-
8:00
»
Hack a Day
[Bart] managed to get his hands on a Macbook Air for free. The catch was that the monitor hinge was broken and the laptop wasn’t in too great of a condition. Rather than scrapping it or using it as a cake cutter, he decided to turn it into a keyboard PC. By removing the internals [...]
-
-
8:00
»
Hack a Day
[Brandon Meyer] spared no expense in modding the Catch Phrase game to use custom word lists. The altered version of the game, normal sold for around $25, now comes in at a whopping $230! That’s because the internals were gutted and replaced with an Arduino, 20×2 LCD display, and some other interesting bits. The device [...]