A short documentary by Michael T. Vollmann explores the birth, the exploits, and the eventual demise of The 414s - a hacker group active in the early 1980s until the summer of 1983. The documentary offers an interesting look into the early innocent days of hacking, especially just how influential the movie Wargames was to bring mainstream recognition. At the same time, the ease with which The 414s could penetrate even the more sensitive computers and the lack of laws to prosecute the adult members of the group resulted in the series of laws including the infamous Computer Fraud and Abuse Act (CFAA) of 1986. Read more.
|Date||November 6th, 2014|
DNSChef is a highly configurable DNS Proxy for Penetration Testers and Malware Analysts. It is capable of fine configuration of which DNS replies to modify or to simply proxy with real responses.
Version 0.3 introduces support for more DNS record types, DNSSEC, logging, more configurable remote nameservers, support for the updated dnslib library and several bug fixes.
Version 0.2 introduces IPv6 support, large number of new DNS record types, custom ports and other frequently requested features. Read more.
exodus - vuln-dev - master class
A few weeks ago I had a great pleasure of studying at a week-long training taught by Exodus Intelligence. The Vulnerability Development - Master Class was taught by Aaron Portnoy, Zef Cekaj, and Peter Vreugdenhil. The class had an excellent presentation of two complementary yet unique subjects of vulnerability discovery and exploit development primarily under Windows environment. The instructors are truly masters of their field which was reflected in the great quality and depth of the material.
While it is still fresh in my mind, I would like to share with you some of the notes on the covered subjects, the recommended prerequisites, and tips on how to get the most out of this very intensive training. Read more.
|Date||September 14th, 2014|
IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool. Some of the plugin's features include a powerful ROP gadgets search engine, semantic gadget analysis and filtering, interactive ROP chain builder, stack pivot analysis, writable function pointer search, cyclic memory pattern generation and offset analysis, detection of bad characters and memory holes, and many others. Read more.
The site was designed and developed by Peter Kacherginsky (iphelix).
All original content on this site is copyright protected and licensed under Creative Commons - Attribution, NonCommercial, ShareAlike 4.0 International.