lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: silvio at big.net.au (silvio@....net.au)
Subject: erm. new+improved www content

ok.. so i'm starting to slowly populate my website again with some things
that may be interesting.  nothing fantastically new on it to be honest,
but perhaps alot will find something interesting.

www.big.net.au/~silvio/

i'm only _starting_ to move across some content atm, so much more will
be added bit by bit.. but atm, there is probably enough things for
people to take a look at.

i'm learning python and some things, non c. you might see more scripts than c
code on the site, depending on what i put up ;-)

graphing/

lots of postscript graphs, all of which are automatically generated
for various things.  eg, callgraphs for awk/bash scripts, routing
maps (interior + exterior).  dns maps.  system call state transitions, mostly
through dynamic analysis etc.  some arp graphs on a network showing
ip relationships.  linking/function graphs etc

0. (zeropoint)

just archiving the stuff i've posted talking about bugs or vulnerabilities
with zero point.

coding/

added some anti-debugging stuff that i've talked about on f-d.. the
ld preload stuff.  modifying binaries to not be ltraced.  some stuff i suppose
is new (public), is the symbol swapping in binaries.  for at least, one
of the source files, a binary patch is required as postprocessing
(to swap writev/ptrace symbol trings) - /bin/vi is the hex editor of choice
here.

1 elf source specific to gnu, that does some compression on the .plt (its
all redundant in standard stuff you know).

something i was working on tonight i put up.. its a control flow grapher
of binary (given a start/stop address), using python + objdump.  at
~115 lines.. its pretty easy to demonstrate that its possible to do quickly,
even in a language your just learning :)  postscript graphs are also
available to see what it does without looking at the source.

there is a .h dependancy graph constructor also as a python script etc.

most of the code is b0rked really, as they are typically quick things i've
done and then put away for a rainy day.  nothing beyond tiny sources
are currently on the site.  this may change in the future.

politics/

this will probably grow.. and i'll archive/link to people if they ask :)
right now it just has one bit of commentry on the t0rnk1t stuff.

non_ms_vendors/

not microsft :)


anyway.. sure, this is a pointless mail.  but i guess since i'm unemployed
i can just move some stuff across to the web, and play with some
new stuff here and there also ;-)

--
Silvio

Powered by blists - more mailing lists