Displaying 11 results from an estimated 11 matches for "deobfuscation".
2006 Oct 31
0
6224278 iwscn should be deobfuscated
Author: edp
Repository: /hg/zfs-crypto/gate
Revision: 3e0648b166ae35e1f3a8f34c03dfe1574e87f55a
Log message:
6224278 iwscn should be deobfuscated
6347629 stream head freed before wscons is done with it
Files:
update: usr/src/uts/common/io/iwscons.c
update: usr/src/uts/common/io/strredirm.c
update: usr/src/uts/common/io/wscons.c
update: usr/src/uts/common/os/space.c
update:
2000 Apr 05
1
pwload / reversed pwget
Hi,
I would be *VERY* interested in a reversed pwget (see
http://www.martnet.com/~johnny/exploits/microsoft/NT/WinNT.passwordhashes.deobfuscation.html)
to be able to automaticaly set first-time NT passwords
('smbpasswd -r' will only work if you first enter the 'previous'
password) on our PDC (evt. remote from UNIX through some tcp (ssh?)
connection).
Bjart Kvarme seems to have written such a tool, called 'pwload'...
2019 Jan 17
2
[RFC] Order File Instrumentation
On Thu, Jan 17, 2019 at 10:53 AM Xinliang David Li <davidxl at google.com>
wrote:
> Hi Manman,
>
> Ordering profiling is certainly something very useful to have to startup
> time performance. GCC has something similar.
>
> In terms of implementation, it is possible to simply extend the edge
> profiling counters by 1 for each function, and instrument the function to
>
2019 Jan 17
4
[RFC] Order File Instrumentation
Order file is used to teach ld64 how to order the functions in a binary. If
we put all functions executed during startup together in the right order,
we will greatly reduce the page faults during startup.
To generate order file for iOS apps, we usually use dtrace, but some apps
have various startup scenarios that we want to capture in the order file.
dtrace approach is not easy to automate, it is
2006 Sep 25
0
Ruxcon 2006
Hi,
RUXCON 2006 will be held this weekend over the 30th of September to the 1st of October at the University of Technology, Sydney. Doors will open at 8:30am and the first presentation commences at 9:30am.
Our presentation list is complete.
RUXCON 2006 Presentations [1]:
1. Java Class Deobfuscation - Chris Mitchell
2. Mechanics of the Objective-C Trifecta - Reversing, Runtime Antics, & Exploit Development - Neil Archibald
3. Exploiting OpenBSD - Ben Hawkes
4. Anti-Forensic Rootkits - Darren Bilby
5. Access over Ethernet: Insecurites in AoE - Morgan Marquis-Boire
6. Attacks Agains...
2019 Jan 17
2
[RFC] Order File Instrumentation
On Thu, Jan 17, 2019 at 2:47 PM Xinliang David Li <davidxl at google.com>
wrote:
>
>
> On Thu, Jan 17, 2019 at 2:32 PM Manman Ren <manman.ren at gmail.com> wrote:
>
>>
>>
>> On Thu, Jan 17, 2019 at 10:53 AM Xinliang David Li <davidxl at google.com>
>> wrote:
>>
>>> Hi Manman,
>>>
>>> Ordering profiling is
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WoldCIST 2015 Team
http://www.aisti.eu/cisti2015...
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WoldCIST 2015 Team
http://www.aisti.eu/cisti2015...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WorldCIST 2015 Team
http://www.aisti.eu/cisti201...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques
?
Data Hiding in file system
?
Manipulation Metadata information
?
Manipulation Block data information
?
Data Hiding in Slackspace
?
Data Hiding in network communication
?
Cover Channel
?
Wipe Techniques
?
Polymorphic variation (obfuscation/deobfuscation)
?
Anti-forensic applied to operating systems
?
Anti-forensic vs Virtualization for protection and/or analysis
?
Anti-forensic in memory
?
Anti-debug Techniques
?
Anti-forensic applied to internal operating system
?
Anti-forensic protection
--
WorldCIST 2015 Team
http://www.aisti.eu/cisti201...
2010 Dec 07
1
[ANNOUNCE] xorg-server 1.9.99.901
Ok, I think we've done enough damage for one release. Thanks everyone
for pulling a long weekend to get changes prepared and reviewed.
We're still missing the threaded input stuff, but that needs more review
and I think we wore Tiago out this time around. If someone wants to
propose merging it after the freeze, I think we should consider doing
it.
Note that this tarball depends on