1. December 2015 Thread

    Infosec & Internetworking Juniper CVE 2015-7755 vulnerable XScale(which is ARMB) firmware https://github.com/hdm/juniper-cve-2015-7755/tree/master/firmware DNS Terminology - Fields and Response Codes https://tools.ietf.org/html/rfc7719#section-3 Boulder automated CA (Currently I am using this thing) https://github.com/letsencrypt/boulder Software LET'S…


  2. Strongswan certificate creation and configuration with POC work

    These lines make certificate creation and configuration work for strongswan with 5.2.1 version Currently Mahmut.p12 is a PKCS12 container format for general distribution of user Mahmut's secure connection initiator. Following file can be renamed to creator.sh and should be run in /etc/ipsec.d it will…

    on strongswan ipsec CA [Certificate Authority]

  3. StackGuard benzeri korumaları aşmak - POC

    Konu hakkında yazacağım diyordum. Galiba şimdi olacak. Geçen haftaların akşamlarından birinde POC bir exploit demosu ortaya çıkarttım. Çok mu güzel? Hayır harika değil. Ama niye ve nasıl yaptığımı açıklamaya çalışacağım. Kod aslında self-explaining bir yapıda ama olsun ben burada açıklama niyetindeyim. StackGuard denilen bir koruma yöntemi var. Stack koruması, processleri…

    on stackguard got altering frame pointer overwrite call stack

  4. Algebra of cracking: Vol.1

    If someone strips the debug info from an executable. It won't stop anyone who wants to hack it. And don't use embedded DEFINE macro also. Something like: #define FOO(x, y, result) \ do { \ do { \ --x; \ ++y; \ } while(x > y); \ result = x * y; \ } while(0) This definition shouldn't be used…

    on object code cracking

  5. Detect heap-based allocation in C

    In most cases `malloc`, `calloc` and `realloc` uses heap-based allocation when we are using libc. For the sake of this we need to check data for where it is allocated. How could you know that it is allocated by functions mentioned above? There is a little trick that you can…

    on c linkers loaders object code