An unexpected journey into Microsoft Defender's signature World:
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#cybersecurity #windowsdefender #windows #informationsecurity #infosec #reverseengineering
Our @recon slides and demo videos are now online as well:
https://silentsignal.hu/docs/S2-REcon24-Control_Flow_Integrity_on_IBM_i.pdf
== Let's make a magnetophone / tape player / magnetic tape head at home! ==
Many people started following me after my DIY magnetic tape and DIY floppy disk experiments. A common request ever since was to make a DIY magnetic head, and, truth to be told, I was curious to experiment with it, too.
The task was daunting, and many people were convinced that it could not be done at all. In fact, I could not find a single mention of a successful experiment in the West, and scarce mentions of it in vintage Russian radio hobbyist magazines. But I know that it could be done; my father says he made some magnetic heads over 40 years ago.
Just two weeks ago Hackaday.com made a post claiming that a (really cool btw) hobbyist made a tape player with a DIY tape head. I was excited at first, and then outraged - it was fake news! The DIY tape head was not (and could not be) used in the tape player on the video, and in fact could only erase tape.
Now, I present you The Real DIY Magnetic/Tape Head (and a DIY microphone)
🧵~
Reverse engineering eBPF programs https://www.armosec.io/blog/ebpf-reverse-engineering-programs/
did you know that intel shipped a userspace driver that does kernel physical memory grooming (like heap grooming, but for physmem allocations) to get a contiguous memory block https://git.dpdk.org/dpdk/tree/lib/eal/linux/eal_memory.c
like... allocates a bunch of pages, checks if they're physically contiguous, frees the ones that are not, and retries it has enough that are, more or less
🦀 The slides for my workshop at @recon in Montreal this year, "Reversing Rust Binaries: One Step Beyond Strings", are now online!
https://github.com/cxiao/rust-reversing-workshop-recon-2024/tree/main/slides
You can find both the slides and the diagrams I used for the workshop linked there. The slides are meant to be a resource for you to use while reversing, so they have lots of clickable links in them (:
In case you lose the link, you can also find the slides linked from my page on the REcon 2024 schedule: https://cfp.recon.cx/recon2024/talk/QCA37X/
Really great to meet so many cool people, and lots of work to do for Rust RE going forward! I left the conference with a lot of great ideas and directions for new research.
#REcon2024 #reconmtl #rustlang #reverseengineering #reversing #malwareanalysis
use-after-free vulnerability due to the interaction between Unix garbage collection (GC) and the io_uring Linux kernel component
https://blogs.oracle.com/linux/post/unix-garbage-collection-and-iouring
Credits Shoily Rahman