«
Expand/Collapse
104 items tagged "sony"
Related tags:
poc [+],
playstation [+],
hack [+],
buffer [+],
network [+],
hacks [+],
sony playstation [+],
read [+],
lulzsec [+],
hackers [+],
geohot [+],
sony hack [+],
second [+],
news [+],
linux [+],
darknet [+],
checkcompatibility [+],
breach [+],
admin [+],
website [+],
sony vaio [+],
sony ericsson [+],
security [+],
removedirectory [+],
psp [+],
prometheus project [+],
pandora [+],
network hack [+],
manager [+],
load [+],
lecture [+],
initial program loader [+],
ericsson [+],
denial of service [+],
chaos communication congress [+],
anonymous [+],
Wireless [+],
Issues [+],
vaio [+],
sony vaio 4 [+],
show [+],
rootkit [+],
root [+],
pwned [+],
multiple buffer overflow [+],
linux support [+],
legal [+],
lawyers [+],
gamers [+],
buffer overflows [+],
buffer overflow vulnerabilities [+],
android [+],
after [+],
accused [+],
ExploitsVulnerabilities [+],
world portal [+],
websites [+],
webservices [+],
war [+],
wait [+],
vpceb [+],
vigilante [+],
video wall [+],
video projectors [+],
video [+],
user base [+],
useless [+],
us department of homeland security [+],
update [+],
ultimatum [+],
uk hackers [+],
u.s. [+],
tweets [+],
tv devices [+],
time [+],
threatens [+],
thai website [+],
thai [+],
testify [+],
surprise [+],
subpoenas [+],
subpoenaed [+],
state [+],
sql [+],
sorry saga [+],
sony tv [+],
sony ps3 [+],
sony online entertainment [+],
sony mobile [+],
sony executives [+],
sony delays [+],
sony bravia tv [+],
sony bmg [+],
soldering iron [+],
snowballs [+],
site [+],
service vulnerability [+],
server data [+],
selling [+],
securty [+],
security woes [+],
security official [+],
security advisory [+],
secunia [+],
secret key [+],
secret [+],
scoundrels [+],
scorns [+],
scandals [+],
scalps [+],
sam [+],
saga [+],
rumours [+],
retaliation [+],
reparations [+],
relaunching [+],
red faced [+],
red [+],
react [+],
rants [+],
pwns [+],
publishers [+],
psn [+],
ps3 [+],
prs t [+],
prs [+],
plugs [+],
plans [+],
phillip torrone [+],
paypal [+],
patch [+],
past [+],
owned [+],
open [+],
next [+],
nex [+],
new york state [+],
new york [+],
new gaming [+],
new [+],
must [+],
music site [+],
mulls [+],
microphone [+],
member [+],
mckinnon [+],
martin [+],
losses [+],
locks [+],
lockheed martin [+],
location data [+],
little [+],
linux boxen [+],
liable [+],
letter [+],
left [+],
lawsuit [+],
lashes [+],
lan [+],
japan music [+],
japan [+],
jackson [+],
italy [+],
iphone [+],
insurer [+],
installation [+],
house hearing [+],
house [+],
hotz [+],
hires [+],
hdtvs [+],
hardware company [+],
hacking [+],
hacker case [+],
hacked [+],
greece [+],
google [+],
goodies [+],
global [+],
gif [+],
full [+],
free sony [+],
fraud [+],
firmware versions [+],
firmware update [+],
fires [+],
fire [+],
fear [+],
faces [+],
external microphone [+],
executives [+],
ebook reader [+],
dslr cameras [+],
driver lan [+],
downloadurltofile [+],
dll [+],
digital [+],
developer world [+],
department of homeland security [+],
department [+],
denial [+],
delays [+],
defacer [+],
data breach [+],
cry [+],
credit card data [+],
crash bug [+],
court [+],
could [+],
confirms [+],
computer gear [+],
complicates [+],
companion [+],
class action lawsuit [+],
claim [+],
challenging [+],
ceo lashes [+],
ceo [+],
canada site [+],
canada [+],
cameras [+],
camera [+],
buffer overflow [+],
bt4 [+],
bravia [+],
boycott [+],
bmg [+],
bluray [+],
blames [+],
becoming [+],
banks [+],
back [+],
avoid [+],
asks [+],
asia [+],
article [+],
april first [+],
april 1 [+],
apologizes [+],
ambitions [+],
aim [+],
advisory [+],
admits [+],
add [+],
Support [+],
Newbie [+],
Latest [+],
HackIt [+],
General [+],
Area [+],
sony pc [+],
pc companion [+],
hacker [+],
based buffer overflow [+]
-
-
7:39
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in PluginManager.dll when handling the value assigned to the 'Path' item in the Admin_RemoveDirectory function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:39
»
Packet Storm Security Recent Files
Sony PC Companion version 2.1 suffers from a boundary error in PluginManager.dll when handling the value assigned to the 'Path' item in the Admin_RemoveDirectory function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:39
»
Packet Storm Security Misc. Files
Sony PC Companion version 2.1 suffers from a boundary error in PluginManager.dll when handling the value assigned to the 'Path' item in the Admin_RemoveDirectory function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:36
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'OrgHeartBeat' item in the CheckCompatibility function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:36
»
Packet Storm Security Recent Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'OrgHeartBeat' item in the CheckCompatibility function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:36
»
Packet Storm Security Misc. Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'OrgHeartBeat' item in the CheckCompatibility function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:33
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:33
»
Packet Storm Security Recent Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
7:33
»
Packet Storm Security Misc. Files
Sony PC Companion version 2.1 suffers from a boundary error in PimData.dll when handling the value assigned to the 'File' item in the Load function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
-
15:33
»
Packet Storm Security Exploits
Sony PC Companion version 2.1 suffers from a boundary error in WebServices.dll when handling the value assigned to the 'bstrFile' item in the DownloadURLToFile function and can be exploited to cause a stack-based buffer overflow via an overly long string which may lead to execution of arbitrary code on the affected machine.
-
-
12:01
»
Hack a Day
[Tynan] loves his Sony NEX-5 camera but he’s fed up with not being able to choose any external microphone when recording video. Recently he set out to remedy that, and managed to add an audio in jack without modify the camera itself. The real trick here is to modify how a microphone accessory connects to [...]
-
-
21:30
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
21:30
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
-
21:47
»
SecDocs
Tags:
games Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up completely destroying the hand held's security including some previously unreleased information about how it was achieved. As one of the original authors of the free PSP SDK, various hacking and development tools as well as being a member of the Prometheus project (better known as team C+D) I am in a unique position to discuss many of these aspects of PSP cracking from bitter experience. The Playstation Portable has been the battle ground between Sony and a small group of hackers for close on three years with Sony implementing new security measures and bug fixing firmware updates to keep people out, all the while the hackers have found more unprotected areas to go after. What nobody had realised was Sony had lost from day one. The lecture will go into detail on a number of different topics related to the cracking of the PSP. An overview of how Sony tried to make the system secure will be presented, to give an idea of how it was supposed to work. Then details about the various classes of attacks that were successfully made against the device and how they each related to a failure in Sony's implementation in one way or another. There will also be discussion on how the firmware was so easily taken apart and what mistakes Sony made in making their design "cleaner" while giving the attackers means to extract kernel information. The final part will describe roughly how in the end the security was completely defeated culminating in Pandora's Battery and the customised initial program loader (IPL). A lot of this talk could be taken generally as a lessons learned lecture for Sony's designers, hopefully they don't take much of it on board.
-
-
8:01
»
Hack a Day
The Sony Bravia series of HDTVs are a great piece of kit; they’re nice displays that usually have enough inputs for the craziest home theatre setups. These TVs also run Linux, but until now we haven’t seen anything that capitalizes on the fact these displays are wall-mounted Linux boxen. [Sam] sent in an exploit to [...]
-
-
12:39
»
Hack a Day
The proud cry of “I am root” rings true once again, this time on Sony Google TV devices. Although a low-level exploit was found on previous firmware versions, a downgrade process lets you run unsigned kernels on updated TV or Bluray models of the Internet streaming devices. These systems are Android-based, which currently run version [...]
-
-
14:30
»
Hack a Day
Cries of “I am root!” abound once again with the rooting of Sony’s PRS-T1 eBook reader. The eBook Reader Blog took the original rooting directions and then looked at some of the things you can do with root access. This hardware is based around an ePaper display, but we must say that the performance seems to [...]
-
-
21:00
»
Packet Storm Security Advisories
Secunia Security Advisory - Sony has discovered a weakness in Comm100 Forum, which can be exploited by malicious people to conduct spoofing attacks.
-
-
7:01
»
Hack a Day
Sony Ericsson recently added a new section to their developer world portal called Unlocking the boot loader. They provide all the information and tools needed to root some of their newer Android phones. Of course, this information comes from Sony Ericsson dripping with warnings, disclaimers and warranty-voiding rhetoric. Once you’ve waded through all of that, [...]
-
-
15:01
»
Hack a Day
[paulgeering] has a set of 10 video projectors, usually found inside Sony’s RVP 4010Q 40″ rear projection system that he must get rid of. He is offering them up for free to any Hack-a-Day reader that is interested. He doesn’t have the room to store them any longer, but he can’t bear to see them [...]
-
-
8:01
»
Hack a Day
[Phillip Torrone] recently wrote an article over at Make regarding Sony and their “War on Makers, Hackers, and Innovators“. In the article, he traces Sony’s history as a well-liked hardware company that once produced innovative products, to its current state as an enemy to all who would dare wield a screwdriver and soldering iron. He [...]
-
-
11:31
»
remote-exploit & backtrack
Could anyone tell me where Can I found drivers for LAN to my Sony ? I was install BT4 on SOny Vaio but LAN didnt work. I search but I couldnt found drivers for LAN and WIFI card.
Please help me.
-
-
10:00
»
Hack a Day
[Geohot] came up with a patch that allows OtherOS on 3.21 PS3 firmware. You’ll remember that Sony released version 3.21 specifically to prohibit OtherOS which allows the installation of Linux for which they were subsequently sued. Well, now their “fix” doesn’t work on people willing to flash patched firmware which means they’re only punishing those [...]
-
-
12:00
»
Hack a Day
On April first Sony rolled out new firmware for the PlayStation 3 that removed the ability to install Linux on the system by blocking a feature called OtherOS. Now a class action lawsuit has been filed against the company for its actions. It doesn’t take an attorney to figure out that they removed features that [...]
-
-
15:00
»
Hack a Day
Sony is rolling out a firmware update for the PS3 on April 1 but we’re pretty sure it’s not a joke. What we’re not sure about is that you can call it an update. It removes features rather than fixing or adding them. In this case, it is removing the “Install Other OS” option that [...]