search for: deobfuscation

Displaying 11 results from an estimated 11 matches for "deobfuscation".

2006 Oct 31
0
6224278 iwscn should be deobfuscated
Author: edp Repository: /hg/zfs-crypto/gate Revision: 3e0648b166ae35e1f3a8f34c03dfe1574e87f55a Log message: 6224278 iwscn should be deobfuscated 6347629 stream head freed before wscons is done with it Files: update: usr/src/uts/common/io/iwscons.c update: usr/src/uts/common/io/strredirm.c update: usr/src/uts/common/io/wscons.c update: usr/src/uts/common/os/space.c update:
2000 Apr 05
1
pwload / reversed pwget
Hi, I would be *VERY* interested in a reversed pwget (see http://www.martnet.com/~johnny/exploits/microsoft/NT/WinNT.passwordhashes.deobfuscation.html) to be able to automaticaly set first-time NT passwords ('smbpasswd -r' will only work if you first enter the 'previous' password) on our PDC (evt. remote from UNIX through some tcp (ssh?) connection). Bjart Kvarme seems to have written such a tool, called 'pwload'...
2019 Jan 17
2
[RFC] Order File Instrumentation
On Thu, Jan 17, 2019 at 10:53 AM Xinliang David Li <davidxl at google.com> wrote: > Hi Manman, > > Ordering profiling is certainly something very useful to have to startup > time performance. GCC has something similar. > > In terms of implementation, it is possible to simply extend the edge > profiling counters by 1 for each function, and instrument the function to >
2019 Jan 17
4
[RFC] Order File Instrumentation
Order file is used to teach ld64 how to order the functions in a binary. If we put all functions executed during startup together in the right order, we will greatly reduce the page faults during startup. To generate order file for iOS apps, we usually use dtrace, but some apps have various startup scenarios that we want to capture in the order file. dtrace approach is not easy to automate, it is
2006 Sep 25
0
Ruxcon 2006
Hi, RUXCON 2006 will be held this weekend over the 30th of September to the 1st of October at the University of Technology, Sydney. Doors will open at 8:30am and the first presentation commences at 9:30am. Our presentation list is complete. RUXCON 2006 Presentations [1]: 1. Java Class Deobfuscation - Chris Mitchell 2. Mechanics of the Objective-C Trifecta - Reversing, Runtime Antics, & Exploit Development - Neil Archibald 3. Exploiting OpenBSD - Ben Hawkes 4. Anti-Forensic Rootkits - Darren Bilby 5. Access over Ethernet: Insecurites in AoE - Morgan Marquis-Boire 6. Attacks Agains...
2019 Jan 17
2
[RFC] Order File Instrumentation
On Thu, Jan 17, 2019 at 2:47 PM Xinliang David Li <davidxl at google.com> wrote: > > > On Thu, Jan 17, 2019 at 2:32 PM Manman Ren <manman.ren at gmail.com> wrote: > >> >> >> On Thu, Jan 17, 2019 at 10:53 AM Xinliang David Li <davidxl at google.com> >> wrote: >> >>> Hi Manman, >>> >>> Ordering profiling is
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques ? Data Hiding in file system ? Manipulation Metadata information ? Manipulation Block data information ? Data Hiding in Slackspace ? Data Hiding in network communication ? Cover Channel ? Wipe Techniques ? Polymorphic variation (obfuscation/deobfuscation) ? Anti-forensic applied to operating systems ? Anti-forensic vs Virtualization for protection and/or analysis ? Anti-forensic in memory ? Anti-debug Techniques ? Anti-forensic applied to internal operating system ? Anti-forensic protection -- WoldCIST 2015 Team http://www.aisti.eu/cisti2015...
2014 Nov 24
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques ? Data Hiding in file system ? Manipulation Metadata information ? Manipulation Block data information ? Data Hiding in Slackspace ? Data Hiding in network communication ? Cover Channel ? Wipe Techniques ? Polymorphic variation (obfuscation/deobfuscation) ? Anti-forensic applied to operating systems ? Anti-forensic vs Virtualization for protection and/or analysis ? Anti-forensic in memory ? Anti-debug Techniques ? Anti-forensic applied to internal operating system ? Anti-forensic protection -- WoldCIST 2015 Team http://www.aisti.eu/cisti2015...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques ? Data Hiding in file system ? Manipulation Metadata information ? Manipulation Block data information ? Data Hiding in Slackspace ? Data Hiding in network communication ? Cover Channel ? Wipe Techniques ? Polymorphic variation (obfuscation/deobfuscation) ? Anti-forensic applied to operating systems ? Anti-forensic vs Virtualization for protection and/or analysis ? Anti-forensic in memory ? Anti-debug Techniques ? Anti-forensic applied to internal operating system ? Anti-forensic protection -- WorldCIST 2015 Team http://www.aisti.eu/cisti201...
2014 Dec 04
0
Call For Papers - Workshops at WorldCIST 2015 - 3rd World Conference on Information Systems and Technologies
...Concept about Stealth and Anti-forensic Techniques ? Data Hiding in file system ? Manipulation Metadata information ? Manipulation Block data information ? Data Hiding in Slackspace ? Data Hiding in network communication ? Cover Channel ? Wipe Techniques ? Polymorphic variation (obfuscation/deobfuscation) ? Anti-forensic applied to operating systems ? Anti-forensic vs Virtualization for protection and/or analysis ? Anti-forensic in memory ? Anti-debug Techniques ? Anti-forensic applied to internal operating system ? Anti-forensic protection -- WorldCIST 2015 Team http://www.aisti.eu/cisti201...
2010 Dec 07
1
[ANNOUNCE] xorg-server 1.9.99.901
Ok, I think we've done enough damage for one release. Thanks everyone for pulling a long weekend to get changes prepared and reviewed. We're still missing the threaded input stuff, but that needs more review and I think we wore Tiago out this time around. If someone wants to propose merging it after the freeze, I think we should consider doing it. Note that this tarball depends on