k0Ng0

@kongo_86

Makes code go backwards; Security Enthusiast; Computer Artist.

Chicago, IL
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @kongo_86

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kongo_86

  1. proslijedio/la je Tweet
    29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  2. 21. sij

    When has too many spelling errors. 🧐🤨🤔

    Poništi
  3. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    Analyzed with and offered improvements to BattlEye's VM detection. It was surprising this was their only method to detect generic hypervisors.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    13. sij
    Poništi
  6. proslijedio/la je Tweet
    12. sij

    BattlEye, a popular anti-cheat, has been detecting unknown cheats by using heuristics in combination with the x86 trap flag. This was done to specifically target "The Perfect Injector" by from usermode.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    7. sij
    Odgovor korisnicima
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    If you're at come say hi to me! At 930am on Wednesday I'll be presenting recent research

    Poništi
  9. proslijedio/la je Tweet
    Poništi
  10. proslijedio/la je Tweet
    5. sij

    Friends, I advise you check out 's Senshi.B. -parasitic direct action infector of PE exe -new EPO for AMD64 files, hooks the CFG function -last section appender -CRCs instead of API names and more. Its a work of art. 1luv -smelly__vx

    Poništi
  11. 3. sij

    Remembered all my passwords!... Logging off.

    Poništi
  12. proslijedio/la je Tweet
    2. sij

    So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing 's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!

    Poništi
  13. proslijedio/la je Tweet
    30. pro 2019.

    Analysis of payload relevant to VISA fuel pump report (incident 2): I put the payload on VT (for static analysis): 3d5ae56c6746e0b3ed5b15124264a0d2 Credit to for initial shellcode. cc for tracking/sigs

    Prikaži ovu nit
    Poništi
  14. 31. pro 2019.

    Two weeks of not touching a computer. I think now I'm starting to miss it. Can't wait to be back.

    Poništi
  15. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  17. proslijedio/la je Tweet
    17. pro 2019.

    If you're interested in getting started with PANDA for debugging and reverse engineering, Tim Leek put together a short introductory course!

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.

    🌟Here's the video for one of my fave talks that I gave this year!🌟 I cover 60 slides of code in 30 min as I explain all the obfuscation used by the botnet, Nicro, at . Who knew Java could be so fun?! Slides:

    Poništi
  19. proslijedio/la je Tweet
    16. pro 2019.

    Looking for a python challenge over the holiday break? Here is my python CTF challenge that can be solved more than one way:

    Poništi
  20. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·