Archive for the ‘Hacking’ Category

Processors Resistant to Hacking

Saturday, April 22nd, 2017

Research Links

i.MX Trust Features

Trusted Execution

  •  Isolates execution of critical SW from possible malware
  •  TrustZone Secure & Normal Worlds (processor modes)
  • Hardware firewalls between CPU & DMA masters and memory & peripherals

High Assurance Boot

  • Authenticated boot: prevents unauthorized SW execution
  •  Encrypted boot: protects SW confidentiality 
  • Digital signature checks embedded in on-chip boot ROM
  •  Run every time processor is reset

HW Cryptographic Accelerators

  •  i.MX family dependent
  •  Symmetric: AES-128, AES-256, 3DES, ARC4
  •  Message Digest & HMAC: SHA-1, SHA-256, MD-5

Secure Storage

  •  Protects data confidentiality and integrity 
  • Off-chip: cryptographic protection including device binding
  •  On-chip: self-clearing Secure RAM • HW-only keys: no SW access

HW Random Number Generation

  • Ensures strong keys and protects against protocol replay
  • On-chip entropy generation
  •  Cryptographically secure deterministic RNG

Secure Clock

  • Provides reliable time source
  •  On-chip, separately-powered real-time clock
  • Protection from SW tampering

Leaked NSA Hacking Tools – FuzzBunch

Saturday, April 15th, 2017

Research Links

Setting Up Websites in virtnet

Tuesday, March 14th, 2017

Research Links

Passwords Hashes and Salt ITS335 Lecture 8 2013 – Steve Gordon

Tuesday, March 7th, 2017

How to hack a Remote computer using Darkcomet(RAT) – Remote Access Tool

Monday, January 30th, 2017

Kali Linux Notes

Monday, January 30th, 2017

Research Links

Overflow Exploitation, Step By Step and Subsequent Usage with Metasploit

Friday, January 13th, 2017

Research Links

Advanced White Hat Hacking Video Series

Thursday, January 12th, 2017
Playlist on Youtube

01. Advanced White Hat Hacking And Penetration Testing - Introduction
	0101 What You Should Expect
	0102 What You Should Know
	0103 What You Will Learn
	0104 System Requirements
02. Advanced White Hat Hacking And Penetration Testing - Getting Organized
	0201 Ethical Hacking
	0202 Dradis Framework
	0203 Using Notes With Dradis
	0204 Importing Data With Dradis
	0205 Installing Plugins In Google Chrome
	0206 Installing Plugins In Mozilla Firefox
	0207 Raspberry PI
	0208 SSH Forwarding
03. Advanced White Hat Hacking And Penetration Testing - Scanning
	0301 Refresher On NMAP
	0302 Scan Types
	0303 Stealth Scanning
	0304 Application Scans Using AMAP
	0305 Web Testing With NMAP
	0306 Scanning And Scripting With NMAP And UDP
	0307 Scanning With Hping
	0308 Payload-Based Scanning With Unicorn Scan
	0309 TCP Scanning With Unicorn Scan
04. Advanced White Hat Hacking And Penetration Testing - Data Acquisition
	0401 Using Wappalyzer
	0402 Using Passive Recon
	0403 Using Firebug
	0404 Using Groundspeed
	0405 Converting With Hackbar
	0406 Managing Cookies
05. Advanced White Hat Hacking And Penetration Testing - Metasploit
	0501 Starting Up Metasploit
	0502 Scanning With Metasploit
	0503 Service Scanning With Metasploit
	0504 SMB Scanning With Metasploit
	0505 Importing Nessus Results
	0506 Creating Payloads
	0507 Creating Standalone Exploits
	0508 Encoding And Packing
	0509 Writing Fuzzers Using Metasploit
	0510 Exploits
	0511 Using Meterpreter
	0512 Post-Exploitation
	0513 Pivoting
	0514 Manipulating Windows API
	0515 Client Side Attacks
	0516 Social Engineering Toolkit
	0517 Spear Phishing
	0518 Web Attacks
	0519 Automating Metasploit
	0520 SQL Server Logins
	0521 Token Stealing
	0522 Extending Metasploit
06. Advanced White Hat Hacking And Penetration Testing - Web Testing
	0601 Running Burp Suite
	0602 Passive Scanning
	0603 Active Scanning
	0604 Using The Intruder
	0605 Brute Forcing Passwords
	0606 SQL Injection Testing With Burp Suite
	0607 Cross Site Scripting With Burp Suite
	0608 Using The Burp Suite Repeater
	0609 Using The Burp Suite Sequencer
	0610 XSS-Me
	0611 SQL-Inject Me
	0612 TamperData
	0613 Injection Attacks With TamperData
	0614 Hidden Form Fields
	0615 ZED Attack Proxy
	0616 Fuzzing With ZED Attack Proxy
	0617 Hackbar
07. Advanced White Hat Hacking And Penetration Testing - Reverse Engineering
	0701 Assembly Basics  - nasm
	0702 Buffer Overflows
	0703 Format String Attacks
	0704 Debugging - Linux
08. Advanced White Hat Hacking And Penetration Testing - Fuzzing
	0801 Peach Fuzzer
	0802 HTTP Fuzzing With Peach
	0803 E-Mail Fuzzing With Peach
	0804 File And Network Fuzzing With Peach
	0805 Sulley
	0806 Spike Proxy
09. Advanced White Hat Hacking And Penetration Testing - Wrapping Up
	0901 Extending Your Learning
10. Advanced White Hat Hacking And Penetration Testing - About The Author
	1001 About Ric Messier

How to exploit a buffer overflow vulnerability – Practical

Thursday, January 12th, 2017

How to trace a Trojan back to its owner

Saturday, December 31st, 2016