blog.netifera.com
netifera
http://blog.netifera.com/tag/probe
April 7th, 2009. Video – The Java Virtual Machine As Shellcode. In this screencast we’re going to look at some features we are working on for the next version of netifera. The two main things we’re going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally. Posted by netifera in news. Peludo “cachicamo” v1.0.0 Released. Peludo Beta 1.0 Released!
blog.netifera.com
netifera
http://blog.netifera.com/category/architecture
November 25th, 2008. About the backdoor in netifera. Some of you might be wondering why the netifera distribution. Includes an executable called ‘backdoor’. We’ll explain all the details of why it exists and how it works, and how large of a security hole it creates so you can decide for yourself if you want to use it or not. Read the rest of this entry ». Posted by netifera in Netifera Architecture. Peludo “cachicamo” v1.0.0 Released. Peludo Beta 1.0 Released! About the backdoor in netifera.
blog.netifera.com
netifera
http://blog.netifera.com/tag/development
December 15th, 2008. We are working on a series of tutorials about how to create new tools, modules, and extensions for the netifera framework. The first tutorial. Covers setting up a development environment with Eclipse. As well as creating and exporting a simple module for the netifera sniffing service. If you have any questions or problems with the tutorial please don’t hesitate to contact us by email at info@netifera.com or join us on IRC in channel #netifera on the freenode.
blog.netifera.com
netifera
http://blog.netifera.com/video-the-java-virtual-machine-as-shellcode
Laquo; Netifera Development Tutorial. Peludo Beta 1.0 Released! Video – The Java Virtual Machine As Shellcode. In this screencast we’re going to look at some features we are working on for the next version of netifera. The two main things we’re going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally. Feed You can leave a response. From your own site.
blog.netifera.com
netifera
http://blog.netifera.com/tag/netifera
April 7th, 2009. Video – The Java Virtual Machine As Shellcode. In this screencast we’re going to look at some features we are working on for the next version of netifera. The two main things we’re going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally. Posted by netifera in news. December 15th, 2008. Posted by netifera in news. December 11th, 2008.
calebbucker.blogspot.com
[In]Seguridad Informática: agosto 2012
http://calebbucker.blogspot.com/2012_08_01_archive.html
Penetration Testing - Ethical Hacking - Vulnerabilities. Viernes, 31 de agosto de 2012. WordPress y Algunas de sus Vulnerabilidades. WordPress ¿Qué es? Publicado por Caleb Bucker. Viernes, agosto 31, 2012. Enviar por correo electrónico. Jueves, 30 de agosto de 2012. Backdorizando Servidores Web con WeBaCoo. WeBaCoo (Web Backdoor Cookie) . WeBaCoo fue diseñado para operar bajo el radar de la moderna puesta al anticuado AV, NIDS, IPS, Network Firewalls y Application Firewalls. Publicado por Caleb Bucker.
subgraph.com
Subgraph - About Us
https://subgraph.com/about-us/index.en.html
Subgraph is an open source security company. This means that we believe that open source means the best possible assurance of security at a time when trust is increasingly challenging. Subgraph takes its inspiration from the domain of cryptography where proprietary algorithms are never trusted, and extends this principle to software. If a proprietary algorithm cannot be trusted, why trust proprietary, closed-source security software? And numerous other security conferences, as well as made contributions ...
gruba.blogspot.com
gruba: IDA Pro 6.2 + Ubuntu 12.04 AMD64
http://gruba.blogspot.com/2012/05/ida-pro-62-ubuntu-1204-amd64.html
Sunday, May 06, 2012. IDA Pro 6.2 Ubuntu 12.04 AMD64. Installing IDA Pro on Linux (AMD64) can be a pain. In previous versions of Ubuntu what I had to do to achieve such task, is to build a IA32 chroot environment (following this. Guide). While effective, this is in my opinion not ideal. Fortunately, in the latest version of Ubuntu it is possible to install almost all the IA32 dependencies by hand following a simple scheme. Ldd idaq grep found. LibXext.so.6 = not found. Libfreetype.so.6 = not found. Dlope...
gruba.blogspot.com
gruba: Working with Visual Studio 2012 & pintools
http://gruba.blogspot.com/2014/12/working-with-visual-studio-2012-pintools.html
Monday, December 22, 2014. Working with Visual Studio 2012 and pintools. Hello there fellow pinheads, this post is going to be short but I think it will be useful for generations to come of pinheads. I've been working with PIN. For quite a long time now and I've reached the conclusion that having to edit the example Visual Studio solution is too annoying. This also is a problem with newcomers as editing the sample solution may lead to difficult to debug problems. The template is can be downloaded here.
gruba.blogspot.com
gruba: The rise of the undead (WebKit Heap Exploitation)
http://gruba.blogspot.com/2011/03/webkit-heap-exploitation-rise-of-undead.html
Friday, March 04, 2011. The rise of the undead (WebKit Heap Exploitation). I remember one day Pablo told me, "forget about attacking metadata, that just wont help you" (or something along those lines, sorry about the inaccuracy). He was right, as he almost always is, in that case. Long gone are the days where heap exploitation was all about attacking (overwriting) the internal structures of the heap allocator. But are they really gone? Our research case was TCMalloc. The reason? Understanding the heap al...
SOCIAL ENGAGEMENT