background preloader


Facebook Twitter

Itzikkotler: So, I have decided to pack... Writing kernel exploits. Libo 0.1 released - Xi Wang. Just tagged libo 0.1, a library for fast integer overflow detection.

libo 0.1 released - Xi Wang

The major interface change in this version is that instead of writing smulo32(...) for detecting signed 32-bit multiplication overflow, you just call overflow_mul(...), and it will figure out the type for you (using black magic). I have also added a unit test using Google Test. Flash_ASLR_bypass. Heap Overflows For Humans 104. Created by mr_me on Sunday the 11 of March, 2012 Tags: heap, exploitation.

Heap Overflows For Humans 104

Heap Overflows For Humans 103. Created by mr_me on Thu Jan 05 03:17:43 +1100 2012 Tags: bitmap attacks, bitmap flip, eip, exploit development, FreeListInUse, heap determinism, heaper, management structures, reversing, RtlCommitRoutine Hi guys!

Heap Overflows For Humans 103

Integer Overflow Paper. My coauthors and I just finished the final version of our paper about integer overflows in C/C++ programs that’s going to appear at ICSE 2012, a software engineering conference.

Integer Overflow Paper

The world's leading source for technical x86 processor information. Vulnerability analysis, Security Papers, Exploit Tutorials. ROPgadget tool v3.3. By Jonathan Salwan - 2011-03-12 Description This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation.

ROPgadget tool v3.3

Since version 3.0, ROPgadget has a auto-roper for build your payload automatically with the gadgets found. GitHub (Stable v4.0.3) Authors Contributors. Introduction to Writing Shellcode. BinDiff. Zynamics BinDiff uses a unique graph-theoretical approach to compare executables by identifying identical and similar functions Description BinDiff is a comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.


DarunGrim: A Patch Analysis and Binary Diffing Tool. Scriptable version of DarunGrim3. Simple shellcode obfuscation. This article aims to provide you with the different steps needed to develop shellcode obfuscation techniques, and their respective deobfuscator assembly stubs.

Simple shellcode obfuscation

MSF-AV-Sandbox [pdf] at master from mrmee/heaper - GitHub. Si - Visualizing entropy in binary files. Last week, I wrote about visualizing binary files using space-filling curves, a technique I use when I need to get a quick overview of the broad structure of a file.

si - Visualizing entropy in binary files

Today, I'll show you an elaboration of the same basic idea - still based on space-filling curves, but this time using a colour function that measures local entropy. Before I get to the details, let's quickly talk about the motivation for a visualization like this. We can think of entropy as the degree to which a chunk of data is disordered. If we have a data set where all the elements have the same value, the amount of disorder is nil, and the entropy is zero. Question: How does loader know ASLR is enabled for a binary? Most people know that ASLR randomizes the base address of the binary when loaded, but how does the loader know that a binary is ASLR capable?

Question: How does loader know ASLR is enabled for a binary?

This is a fairly easy question to answer but from what I can tell is rarely documented as a detection method and the subject of this post. Spray / mem patterns visualizer. Heappie!

spray / mem patterns visualizer

Is an exploit-writing-oriented memory analysis tool. It assists vulnerability researchers in tracking heap sprays (as well as other memory patterns) by providing visualization of the memory state. Moreover, as samples are generated for each memory state, Heappie! Can analyze these together and obtain their intersection. With this feature one can easily find commonalities between several runs, even when switching between software versions or platforms. Hellman/libformatstr - GitHub. Intel Instruction Set. 80x86 instruction set I have started to update this site which will cover all new processors. I have also changed the mirroring policy. If you have found anywhere the mirror of this site, please send me an URL. Thanks. This document contains general information about the Intel 80x86 family architecture and complete (I hope) instruction set of this processors up to 80486.

X86 Opcode and Instruction Reference 1.11. General notes: POP CSIntel iAPX 86/88, 186/188 User's manual: When the opcode 0FH is encountered, the 8086,88 will execute a POP CS; the 80186,188 will execute an illegal instruction exception.Branch PrefixesBranch hints have effect only on NetBurst microarchitecture: A Detailed Look Inside the Intel NetBurst Micro-Architecture of the Intel Pentium 4 Processor: Branch hints are interpreted by the translation engine, and are used to assist branch prediction and trace construction hardware. They are only used at trace build time, and have no effect within already-built traces.Alternating branch prefix: The microarchitecture of Intel and AMD CPU's, By Agner Fog, Copyright © 1996 - 2006.90 NOP90 NOP is not really aliased to XCHG eAX, eAX instruction.

Notes for the Ring Level, used in case of f mark: System Call Table. Linux System Call Table The following table lists the system calls for the Linux 2.2 kernel. It could also be thought of as an API for the interface between user space and kernel space. My motivation for making this table was to make programming in assembly language easier when using only system calls and not the C library (for more information on this topic, go to On the left are the numbers of the system calls.