Displaying 11 results from an estimated 11 matches for "deobfusc".
Did you mean:
obfusc
2006 Oct 31
0
6224278 iwscn should be deobfuscated
Author: edp
Repository: /hg/zfs-crypto/gate
Revision: 3e0648b166ae35e1f3a8f34c03dfe1574e87f55a
Log message:
6224278 iwscn should be deobfuscated
6347629 stream head freed before wscons is done with it
Files:
update: usr/src/uts/common/io/iwscons.c
update: usr/src/uts/common/io/strredirm.c
update: usr/src/uts/common/io/wscons.c
update: usr/src/uts/common/os/space.c
update: usr/src/uts/common/os/streamio.c
update: usr/src/uts/commo...
2000 Apr 05
1
pwload / reversed pwget
Hi,
I would be *VERY* interested in a reversed pwget (see
http://www.martnet.com/~johnny/exploits/microsoft/NT/WinNT.passwordhashes.deobfuscation.html)
to be able to automaticaly set first-time NT passwords
('smbpasswd -r' will only work if you first enter the 'previous'
password) on our PDC (evt. remote from UNIX through some tcp (ssh?)
connection).
Bjart Kvarme seems to have written such a tool, called 'pwload...
2019 Jan 17
2
[RFC] Order File Instrumentation
...te to the new pass manager with a shim for the legacy pass
>> manager.
>> (2) For the order file buffer, consider always emitting definitions,
>> making them LinkOnceODR with a COMDAT group.
>> (3) Add testing case for clang/compiler-rt patches.
>> (4) Add utilities to deobfuscate the profile dump.
>> (5) The size of the buffer is currently hard-coded (
>> INSTR_ORDER_FILE_BUFFER_SIZE).
>>
>> Thanks Kamal for contributing to the patches! Thanks to Aditya and Saleem
>> for doing an initial review pass over the patches!
>>
>> Manman...
2019 Jan 17
4
[RFC] Order File Instrumentation
...nd compiler-rt respectively.
TODO:
(1) Migrate to the new pass manager with a shim for the legacy pass manager.
(2) For the order file buffer, consider always emitting definitions, making
them LinkOnceODR with a COMDAT group.
(3) Add testing case for clang/compiler-rt patches.
(4) Add utilities to deobfuscate the profile dump.
(5) The size of the buffer is currently hard-coded (
INSTR_ORDER_FILE_BUFFER_SIZE).
Thanks Kamal for contributing to the patches! Thanks to Aditya and Saleem
for doing an initial review pass over the patches!
Manman
-------------- next part --------------
An HTML attachment w...
2006 Sep 25
0
Ruxcon 2006
Hi,
RUXCON 2006 will be held this weekend over the 30th of September to the 1st of October at the University of Technology, Sydney. Doors will open at 8:30am and the first presentation commences at 9:30am.
Our presentation list is complete.
RUXCON 2006 Presentations [1]:
1. Java Class Deobfuscation - Chris Mitchell
2. Mechanics of the Objective-C Trifecta - Reversing, Runtime Antics, & Exploit Development - Neil Archibald
3. Exploiting OpenBSD - Ben Hawkes
4. Anti-Forensic Rootkits - Darren Bilby
5. Access over Ethernet: Insecurites in AoE - Morgan Marquis-Boire
6. Attacks A...
2019 Jan 17
2
[RFC] Order File Instrumentation
...or the legacy pass
>>>> manager.
>>>> (2) For the order file buffer, consider always emitting definitions,
>>>> making them LinkOnceODR with a COMDAT group.
>>>> (3) Add testing case for clang/compiler-rt patches.
>>>> (4) Add utilities to deobfuscate the profile dump.
>>>> (5) The size of the buffer is currently hard-coded (
>>>> INSTR_ORDER_FILE_BUFFER_SIZE).
>>>>
>>>> Thanks Kamal for contributing to the patches! Thanks to Aditya and
>>>> Saleem for doing an initial review pass ov...
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WoldCIST 2015 Team
http://www.aisti.eu/cist...
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WoldCIST 2015 Team
http://www.aisti.eu/cist...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WorldCIST 2015 Team
http://www.aisti.eu/cis...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WorldCIST 2015 Team
http://www.aisti.eu/cis...
2010 Dec 07
1
[ANNOUNCE] xorg-server 1.9.99.901
...fb: Delete unused oneRect private field.
damage: Delete NOTUSED block--it was never not NOTUSED.
Delete unused devPrivate field from GCFuncs and GCOps.
Delete unused lastWinOrg field from GCs.
Delete xaaWrapper.
Delete redundant GC initializations.
dixfonts: Deobfuscate GC ops calls.
xquartz: Delete compile-time-constant DRIGCRec.driOps field.
xnest: Replace use of Colormap->devPriv with standard devPrivates.
Delete Colormap->devPriv. It isn't used any more.
VGA arbiter: No need for arbitration around CreateGC.
glxdriswra...