Free reverse engineering tool developed by the National Security Agency
POPULARITY
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874
This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874
The CISA and FBI warn that Ghost ransomware has breached organizations in over 70 countries. President Trump announces his pick to lead the DOJ's National Security Division. A new ransomware strain targets European healthcare organizations. Researchers uncover four critical vulnerabilities in Ivanti Endpoint Manager. Microsoft has patched a critical improper access control vulnerability in Power Pages. The NSA updates its Ghidra reverse engineering tool. A former U.S. Army soldier admits to leaking private call records. Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. The pentesters' breach was simulated — their arrest was not. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. Learn more in the report. Selected Reading CISA and FBI: Ghost ransomware breached orgs in 70 countries (Bleeping Computer) Trump to nominate White House insider from first term to lead DOJ's National Security Division (The Record) New NailaoLocker ransomware used against EU healthcare orgs (Bleeping Computer) PoC Exploit Published for Critical Ivanti EPM Vulnerabilities (SecurityWeek) Microsoft Patches Exploited Power Pages Vulnerability (SecurityWeek) NSA Added New Features to Supercharge Ghidra 11.3 (Cyber Security News) Army soldier linked to Snowflake extortion to plead guilty (The Register) Katie Arrington Returns to Pentagon as DoD CISO (GovInfo Security) Penetration Testers Arrested by Police During Authorized Physical Penetration Testing (Cyber Security News) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Zak Paine and Jordan Sather break down a week of absolute bombshells, from the impending confirmation of Kash Patel as FBI Director to the NSA dropping Ghidra 11.3, coincidentally aligning with one of the drops most infamous markers. Trump openly acknowledges the dangers of his 2024 run, while the mainstream media scrambles to contain the fallout from a flood of red-pill-worthy disclosures. Plus, AI-powered humanoid robots are looking way too much like Westworld drones, and it's only a matter of time before they're enforcing HOA curfews. The storm is here...grab some popcorn.
We review the cult classic debut album from one of hip-hop's most celebrated characters, MF DOOM, titled Operation: Doomsday, released in 1999. Doom (formerly known as Zev Love X of KMD) reemerged after years of absence due to the untimely death of his brother DJ Sub Rock. After being screwed by the industry, this super rap villain returned to the scene exhibiting a metal mask and a new persona, with raps much darker and more complex than ever before. https://www.instagram.com/str8_the_clippa?igsh=cTBzNnFhenRkN3Nl&utm_source=qr https://www.facebook.com/profile.php?id=100086006336425&mibextid=LQQJ4d https://www.tiktok.com/@brandonhetzel996?_t=8mU5fLStz0F&_r=1
Stephen Sims shares his years of experience with us and shows us how we can make money hacking. But be careful - some of the options are not recommended. // Stephen's Social // YouTube: https://www.youtube.com/@OffByOneSecu... Twitter: / steph3nsims // Stephen Recommends // Programming Tools: Online Compiler, Visual Debugger, and AI Tutor for Python, Java, C, C++, and JavaScript: https://pythontutor.com/ PyCharm – Python IDE with Great IDA Pro Support:https://www.jetbrains.com/pycharm/ VS Code:https://code.visualstudio.com/ Patch Diffing: Windows Binary Index for Patch Diffing:https://winbindex.m417z.com/ BinDiff Tool for IDA Pro, Ghidra, or Binary Ninjahttps://www.zynamics.com/bindiff.html Diaphora Diffing Tool for IDA Prohttp://diaphora.re/ PatchExtract for Extracting MS Patches from MSU Formathttps://gist.github.com/wumb0/306f97d... Vulnerable Things to Hack HackSys Extreme Vulnerable Driver:https://github.com/hacksysteam/HackSy... WebGoat – Deliberately Insecure Application:https://owasp.org/www-project-webgoat/ Damn Vulnerable Web App:https://github.com/digininja/DVWA Buggy Web App:http://itsecgames.com/ Gruyere Cheesy Web App:https://google-gruyere.appspot.com/ Metasploitable:https://sourceforge.net/projects/meta... Damn Vulnerable iOS App:https://resources.infosecinstitute.co... OWASP Multillidae:https://github.com/webpwnized/mutillidae Online CTF's and Games: SANS Holiday Hack 2023 and Prior:https://www.sans.org/mlp/holiday-hack... https://www.holidayhackchallenge.com/... CTF Time – A great list of upcoming and previous CTF's!:https://ctftime.org/ YouTube Channels: / @davidbombal / @nahamsec / @offbyonesecurity / @_johnhammond / @ippsec https://www.youtube.com/@LiveOverflow... Free Learning Resources: SANS Free Resources – Webcasts, Whitepapers, Posters & Cheat Sheets, Tools, Internet Storm Center:https://www.sans.org/security-resources/ Shellphish - Heap Exploitation:https://github.com/shellphish/how2heap Exploit Database - Downloadable Vulnerable Apps and Corresponding Exploits:https://www.exploit-db.com/ Google Hacking Database (GHDB):https://www.exploit-db.com/google-hac... Google Cybersecurity Certificate:https://grow.google/certificates/cybe... Phrack Magazine:http://www.phrack.org/ Kali Linux:https://www.kali.org/get-kali/#kali-p... Slingshot Linux:https://www.sans.org/tools/slingshot/ Books & Articles: Gray Hat Hacking Series: https://amzn.to/3B1FeIK Hacking: The Art of Exploitation: https://amzn.to/3Us9Uts A Guide to Kernel Exploitation: https://amzn.to/3vfY8vu Smashing the Stack for Fun and Profit – Old, but a classic:https://inst.eecs.berkeley.edu/~cs161... Understanding Windows Shellcode – Old, but still good:https://www.hick.org/code/skape/paper... Great list of exploitation paper links from Shellphish!:https://github.com/shellphish/how2hea... // Stephen's previous videos with David // Free Exploit development training (beginner and advanced) • How to make Millions $$$ hacking zero... Buffer Overflow Hacking Tutorial (Bypass Passwords): • Buffer Overflow Hacking Tutorial (Byp... // David's SOCIAL // Discord: / discord X / Twitter: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos: sponsors@davidbombal.com apple ios android samsung exploit exploit development zero day 0day 1day dark web microsoft macos apple linux kali linux Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #android #ios #hacker
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Jeffrey Gennari, a senior malware reverse engineer, and Garret Wassermann, a vulnerability analyst, both with the SEI's CERT Division, discuss Kaiju, a series of tools that they have developed that allows for malware analysis and reverse engineering. Kajiu helps analysts take better advantage of Ghidra, the National Security Agency's reverse-engineering tool.
Join Hackaday Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi as they ring in the New Year with the first podcast episode of 2022. We get the bad news out early for those still thumbing away at their Blackberries, then pivot into some of the highlights from over the holidays such as the release of NODE's The Pinouts Book and the discovery of a few expectation-defying OpenSCAD libraries. We'll look at modifying a water cooler with Ghidra, and the incredible technology that let's historians uncover the hidden history of paintings. Oh, and we'll also talk about all the best and most important stories of the last 12 months. There's a lot of ground to cover, so get comfortable.
Your fledgling startup has just been sued by one of the most powerful companies in the world. How do you defend yourself?And keep your company afloat?This was the challenge faced by Amanda Gorton, CEO of Corellium, a company whose virtualization platform enables efficient mobile security research and quality testing across a massive variety of devices. Sued by Apple for both copyright infringement and violation of the Digital Millennium Copyright Act (DMCA), Amanda was thrust into an exhausting balancing act of defending and running her young business at the same time. In this episode of Security Voices, she shares the details of how she survived and successfully defended her company.Dave and Amanda go beyond the lawsuit and into the tricky territory of companies like Corellium who provide a service whose sales process must be governed by a clear sense of ethics to avoid it falling into the wrong hands. She shares the real world challenges of developing and applying such a policy in a company and while it may be uncomfortable to trust a small company with such a weighty responsibility, they just might be the very best option we have.We explore the complicated nature of DMCA in a world that has changed dramatically since its anti-Napster driven inception back in the late 90s. From the NSA's release of Ghidra to Web3, we muse on the future of the DMCA whose relevance feels to be slipping into the history books.BioAmanda Gorton is co-founder and CEO of Corellium, which provides an Arm-native cloud platform that virtualizes mobile and IoT devices across iOS, Android, and Linux. Corellium enables never-before-possible security research, development, and quality testing of apps, firmware, and hardware on Arm. Previously, Gorton co-founded and was the CEO of security startup Virtual, which was acquired by Citrix in 2014. She earned a degree in classics from Yale University.
We begin the episode with a review of the massive Kaseya ransomware attack. Dave Aitel digs into the technical aspects while Paul Rosenzweig and Matthew Heiman explore the policy and political implications. But either way, the news is bad. Then we come to the Florida “deplatforming” law, which a Clinton appointee dispatched in a cursory opinion last week. I've been in a small minority who thinks the law, far from being a joke, is likely to survive (at least in part) if it reaches the Supreme Court. Paul challenges me to put my money where my mouth is. Details to be worked out, but if a portion of the law survives in the top court, Paul will be sending a thousand bucks to Trumpista nonprofit. If not, I'll likely be sending my money to the ACLU. Surprisingly, our commentators mostly agree that both NSA and Tucker Carlson could be telling the truth, despite the insistence of their partisans that the other side must be lying. NSA gets unaccustomed praise for its … wait for it … rapid and PR-savvy response. That's got to be a first. Paul and I conclude that Maine, having passed in haste the strongest state facial recognition ban yet, will likely find itself repenting at leisure. Matthew decodes Margrethe Vestager's warning to Apple against using privacy, security to limit competition. And I mock Apple for claiming to protect privacy while making employees wear body cams to preserve the element of surprise at the next Apple product unveiling. Not to mention the 2-billion-person asterisk attached to Apple's commitment to privacy. Dave praises NSA for its stewardship of a popular open source reverse engineering tool, Ghidra. And everyone has a view about cops using YouTube's crappy artificial intelligence takedown engine to keep people from posting videos of their conversations with cops. And more! Download the 369th Episode (mp3) You can subscribe to The Cyberlaw Podcast using iTunes, Google Play, Spotify, Pocket Casts, or our RSS feed. As always, The Cyberlaw Podcast is open to feedback. Be sure to engage with @stewartbaker on Twitter. Send your questions, comments, and suggestions for topics or interviewees to CyberlawPodcast@steptoe.com. Remember: If your suggested guest appears on the show, we will send you a highly coveted Cyberlaw Podcast mug! The views expressed in this podcast are those of the speakers and do not reflect the opinions of their institutions, clients, friends, families, or pets
Oxide and Friends Twitter Space: June 21, 2021What's a bug? What's a debugger?We've been holding a Twitter Space weekly on Mondays at 5p for about an hour. Even though it's not (yet?) a feature of Twitter Spaces, we have been recording them all; here is the recording for our Twitter Space for June 21, 2021.In addition to Bryan Cantrill and Adam Leventhal, speakers on June 21st included Dan Cross, Sean Klein, Aram Hăvărneanu, and the mononymous Nate. (Did we miss your name and/or get it wrong? Drop a PR!)Some of the topics we hit on, in the order that we hit them: Adam's toddler (being chased by a rooster) > Don't get me wrong, some of my best friends are three-year-olds. [@3:12](https://youtu.be/UOucW3F7nCg?t=192) Sy Brand's tutorial Writing a Debugger Lobsters – when HN isn't enough! [@4:34](https://youtu.be/UOucW3F7nCg?t=274) Bryan's debuggers MDB Modular Debugger > Adam: I think people are using cargo-cult debugging, rather than getting to the root cause > of these things, or being satisfied until they get to the root cause. > Bryan: I think with software systems, it's really hard to know what they're actually doing. Procedure Linkage Table aka “the plits” “Runtime Performance Analysis of the M-to-N Scheduling Model” (pdf) 1996 undergrad thesis (Brown CS dept website) [@6:29](https://youtu.be/UOucW3F7nCg?t=389) Threadmon website and 1997 paper (a retooling of the '96 paper) > When I built that tooling, it revealed this thing > is not doing at all what anyone thought it was doing. TNF Trace Normal Form > Part of the problem with debuggers… debuggers are historically written by compiler folks, > and not system folks. As a result, debuggers are designed to debug the problem that > compiler folks have the most familiarity with, and that's a compiler. > Debuggers are designed for reproducible problems, way too frequently. I view in situ breakpoint debugging as one sliver of debugging that's useful for one particular and somewhat unusual class of bugs. That's actually not the kind of debugger I want to use most of the time. Software breakpoints [@11:59](https://youtu.be/UOucW3F7nCg?t=719) > libdis was my intern project in 2000. The idea was to take the program text, > and interpret it in some structural form, and try to infer different things about the program. Ghidra: software reverse engineering tool Laura Abbott's Exploiting Undocumented Hardware Blocks in the LPC55S69 Volatility: the memory forensics framework Adam couldn't quite remember. [@14:59](https://youtu.be/UOucW3F7nCg?t=899) I meant this question earnestly, what is a debugger? The first bug > The term is somewhat regrettable… It implies a problem, when there may not be a problem. > It may just be I want to understand how the system is operating, independent of whether > it's doing it badly. Wikipedia on Observability (control theory) Oxide's embedded OS and companion debugger: Hubris and Humility [@19:01](https://youtu.be/UOucW3F7nCg?t=1141) Using DTrace to help customers understand their systems. > If you strings the DTrace binary, > you're not gonna find any mention of raincoats.Cliff Moon on Boundary [@22:13](https://youtu.be/UOucW3F7nCg?t=1333) Cardinal rule of debuggers: Don't kill the patient! (see also: Do No Harm) > Not killing the patient is really important, > this was always an Ur principle for us. The notion that the debugger has now become load bearing in the execution of the program, is a pretty grave responsibility. [@26:54](https://youtu.be/UOucW3F7nCg?t=1614) Post-mortem debugging > It is a tragedy of our domain that we do not debug post-mortem, routinely. Heisenbug (when the act of observing the problem, hides the problem) [@31:11](https://youtu.be/UOucW3F7nCg?t=1871) > What's going on in the system? It's not crashing, there's no core dump. > But the system is behaving in a way I didn't expect it to, and I want to know why. [@33:51](https://youtu.be/UOucW3F7nCg?t=2031) Pre-production reliability techniques > All of our pre-production work has gotten way better than it was, and I think that's > compensation for the fact we can't understand these systems when we deploy them. [@37:58](https://youtu.be/UOucW3F7nCg?t=2278) > The move to testing has in fact obviated some of the need for > what we consider traditional debuggers. > (Bryan audibly cringes) [@39:08](https://youtu.be/UOucW3F7nCg?t=2348) Automated and Algorithmic Debugging conference AADEBUG 2003 HOPL History of Programming Languages > There was a test suite of excellence when it comes to automated program debugging. > And it was some pile of C programs with known bugs, and you would throw your new > paper at it, and it would find 84% of the bugs, and there would be a lot of > slapping each other on the back on that. Really focused on the simplest of simple bugs. [@43:15](https://youtu.be/UOucW3F7nCg?t=2595) Bryan's Postmortem Object Type Identification paper > Who is my neighbor in memory? Because my neighbor just burned down my house basically. mdb's ::kgrep > I need to pause you there because it's so crazy, and I want to emphasize that > he means what he's saying. We look for the 64 bit value, and see where we find it. > This is a game of bingo across the entire address space. We can follow the pointers and propagate types. [@48:49](https://youtu.be/UOucW3F7nCg?t=2929) printf/println debugging – everyone's doing it > I think it's a mistake for people to denigrate printf debugging. > If you've got a situation that you can debug quickly with printf, you should do that. Early, sometimes student-friendly IDEs > These poor students are weeping in the Sun lab at two in the morning because they > can't debug their programs, because they're not allowed to use printf [@54:14](https://youtu.be/UOucW3F7nCg?t=3254) Research on statistical debugging from Ben Liblit [@57:32](https://youtu.be/UOucW3F7nCg?t=3452) > The disposition towards tooling changes once you've found your first bug with it. “I'm dealing with a house fire right now, it's not time for me to learn something new, my house is burning and I want to focus on that.” NOVA hypervisor debugging by inspecting registers > There's nothing quite like driving one of these unknown issues to the root cause; so satisfying. [@1:02:10](https://youtu.be/UOucW3F7nCg?t=3730) > I buy the argument that some of the lack of observability has been one of the strong motivators > for rooting out some of these problems earlier with CI/CD and test-driven development. [@1:03:04](https://youtu.be/UOucW3F7nCg?t=3784) > Dynamically instrumenting dynamic languages effectively requires VM cooperation. Perl 6 and Parrot book Raku née Perl 6 Adam's ten-year prediction: the end of Moore's Law will precipitate a culture of observability and debugging. If we got something wrong or missed something, please file a PR! Our next Twitter space will likely be on Monday at 5p Pacific Time; stay tuned to our Twitter feeds for details. We'd love to have you join us, as we always love to hear from new speakers!
Hackaday editors Elliot Williams and Mike Szczys recount the coolest hacks from the past week. Most clocks keep time with a quartz crystal, but we discuss one that uses a tuning fork... like the kind you use to tune a piano. Ghidra is a powerful reverse engineering tool developed by the NSA that was recently put to good use changing an embedded thermometer display from Celsius to Fahrenheit. We talk turkey on the Texas power grid problems and Tesla's eMMC failures. And of course there's some room for nostalgia as we walk down memory lane with the BASIC programming language.
Jen and Alvaro chat with Florian Märkl (metallic.software) and Itay Cohen (megabeets.net) about the open source reverse engineering tools Rizin and Cutter. Florian and Itay are part of the core development team for Rizin and Cutter, which forked from radare2 in December of 2020. To learn more about the project, check out the Rizin FAQ. For a quick getting started guide, check out the Rizin Book. Florian also recommends watching Arnau’s talks on beginner r2/Rizin concepts here: https://www.youtube.com/watch?v=317dNavABKo https://www.youtube.com/watch?v=ARH1S8ygDnk You can chat with the Rizin/Cutter community on their mattermost chat. Here are links to some of the other topics we discussed: IDA Pro Unity game engine strings objdump Ghidra gdb ASLR Chiaki PS Remote Play Stadia Frida Wireshark Rizin supported OS’s, Architectures, etc RISC-V Contributor Covenant Meson Build System The Rizin Book Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Turvakäräjät swag-kauppahttps://teespring.com/turvakarajatHelSec virtual meetup #5-tallenteethttps://www.youtube.com/playlist?list=PLJDd2aYn8T1CNLdxEdmv_asNyFZVijskAHakkeriradion rahoituskampanjahttps://mesenaatti.me/1916/tehdaan-yhdessa-hakkeriradio/Velikanin / H7 tekemä HelSec ANSI-taideteoshttps://twitter.com/velikani/status/1336394148006551555?s=20FireEyen julkaisu SolarWinds Orion-tuotteeseen ujutestusta takaovestahttps://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlYdinaseet vaarassa SolarWinds-takaoven vuoksihttps://www.bleepingcomputer.com/news/security/solarwinds-hackers-breach-us-nuclear-weapons-agency/ZDNetin uutisoinnit SolarWinds-aiheestahttps://www.zdnet.com/article/sec-filings-solarwinds-says-18000-customers-are-impacted-by-recent-hack/https://www.zdnet.com/article/microsoft-and-industry-partners-seize-key-domain-used-in-solarwinds-hack/Volexityn analyysi hyökkäyksestähttps://www.helpnetsecurity.com/2020/12/16/solarwinds-hackers-capabilities/Helsingin Sanomien uutisointi SolarWinds-tapauksestahttps://www.hs.fi/ulkomaat/art-2000007687185.htmlVinoth Kumarin twiitti FTP-tunnuksistahttps://twitter.com/vinodsparrow/status/1338431183588188160?s=21Ghidran debugger-ominaisuus julkaistuhttps://github.com/NationalSecurityAgency/ghidra/tree/debuggerTutkijat onnistuivat lähettämään dataa käyttämällä muistia WiFi-korttinahttps://www.zdnet.com/google-amp/article/academics-turn-ram-into-wifi-cards-to-steal-data-from-air-gapped-systems/AIR-FI tieteellinen artikkelihttps://arxiv.org/pdf/2012.06884.pdf Magecart-kollektiivi on ollut aktiivinen luottokorttitietojen varastamisessahttps://www.bleepingcomputer.com/news/security/stealthy-magecart-malware-mistakenly-leaks-list-of-hacked-stores/https://www.bleepingcomputer.com/news/security/credit-card-stealer-hides-in-css-files-of-hacked-online-stores/https://www.bleepingcomputer.com/news/security/credit-card-stealing-malware-hides-in-social-media-sharing-icons/SanSecin tutkimus Magecartin käyttämästä remote access trojan (RAT)-haittaohjelmasta, joka vuotaa Magecartin uhrien tiedothttps://sansec.io/research/ecommerce-rat-leaks-victimsRevolut-virtuaalipankkihttps://www.revolut.com/Yritykset kärsivät verkkorikollisuudesta selvästi useammin Suomessa kuin muualla Euroopassahttps://yle.fi/uutiset/3-11695621DoppelPaymer-kiristyshaittaohjelmaryhmittymä häiriköi uhrejansa nykyään puhelimitsehttps://www.zdnet.com/article/fbi-says-doppelpaymer-ransomware-gang-is-harassing-victims-who-refuse-to-pay/F-Securen 2021 kyberakatemiahttps://emp.jobylon.com/jobs/70516-f-secure-cyber-security-academy-2021-finland/
This week on Moscow Mules and NOP Slides, we have we Dan Plohmann. Check out our first transatlantic podcast! Dan joins us from Germany where he sips on a Riegele BrauWalk Simco 3 out of Tulip glass from his local home brewers association. We start off by discussing the craft beer scene in Germany. Dan then discusses his journey into cyber security where he started in the wireless space before transitioning to malware analysis to working on his PhD. Dan talks about why he started Malpedia and its growth over the years. We conclude with Dan telling us about his most recent hobby as a chili pepper farmer. Be sure to check out Malpedia at https://malpedia.caad.fkie.fraunhofer.de/! Dave drinks on a Double Berry Eclipse Sour from Grist House Craft Brewery out of Hop Killers Mario themed glass. David also finds out what happens when you mention "Ghidra" on the podcast. Kyle sips on a #17 Yinzbetto from Ever Grain Brewing Company out of a 4Mer Legends Bo Knows Beer glass. Thank you to Dan for being a guest and the great conversation! We hope you enjoy. Please don't forget to subscribe! Disclaimer: The views and expressions of the guests and hosts are their own and not of their employers.
Asmita Jha from Payatu gave an Intro to Firmware Reverse Engineering workshop during Remoticon and we followed up with her to dive deeper. She brought lists upon lists of resources and many we had not seen, make sure you check them out. Firmware Center - https://firmware.center/ IOT security 101 https://github.com/V33RU/IoTSecurity101 Strings Binwalk Trustzone -ARMChipwhisperer ( But also see our interview with Colin) Azeria Labs Radare2 with various GUIs like Cutter Literally thousands of Ghidra tutorials Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Jen and Alvaro summarize the annual survey results and chat about the future of the show. Congratulations to Austin from Australia for winning the Analog Discovery 2! We’ve started a Patreon! If you’d like to donate to support the show, but don’t care for Patreon, you can also use PayPal to send funds to show@unnamedre.com. Here are some of the survey results: In your day to day life you are a: Top results: Software Engineer Hardware Engineer Security Engineer Firmware Engineer Other interesting ones: Carpenter Doctor Students/educators Most people do listen a lot. Some several per day and some multiple per week 60% Who else are you listening to: Top ones: The Amp Hour Embedded.fm Darknet Diaries HackADay Podcast SecurityNow! Macrofab Engineering Podcast This week in xxxx, cpp cast, Risky Business, On the Metal Listening while: 60% during zoning out: commute/chores 20% during desk work or exercise Listening via: Apple, overcast, PocketCasts, RSS were main responses. Podcast apps used Apple, overcast, PocketCasts, RSS were main responses. When do you listen to new shows? ⅕ only when interested, otherwise pretty quickly listen to new show. How to find us? Social media 44 or 30% Amp hour/embedded total of 25% Suggested by web or other means like other pods 63% In person 2 people What have been your favorite episode types? Guest episodes 3:2 guests to just cohost Just Jen and Alvaro Conferences 1:3 confs to guests Fave episodes Jeri 26 Conferences Dmitri 2 Ghidra 18 Frequency 51% Too Infrequent 42% Just right You want more but not at the expense of content. You like the interviews for Casual conversions with good questions to help understand new concepts and tools. After listening to an episode You learned some new stuff and are ready to try out a new project. All around 95% of the audience fell into these categories. Parts you like overall: Knowledgeable guests and hosts (whew…) Ok but could find more topics. Show notes and website: You use the show notes!! 80+% use them in some capacity. Hardly anyone used the website but only for show notes (31%) Things to change We have a bimodal audience for beginner versus depth. It’s great but challenging. We can tag better to help meet your needs. Alter music gain. Giggling will probably continue. Sorry. Things to keep You like us! Yay! Topics: Soooo many topics and people. You want: stickers and tees The intro song is Happiest Robot and the outro is Digital Zen, both by TeknoAxe. We’ve been using Zencastr to record the show. Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
In this podcast, Jeff Gennari and Cory Cohen discuss updates to the Pharos Binary Analysis Framework in GitHub, including a new plug-in to import OOAnalyzer analysis into the NSA's recently released Ghidra software reverse engineering tool suite.
A conversation with The National Security Agency's community outreach team about open source software, learning new skills and sharing tech origin stories.
News RetroArch Overlay Editor – Create and edit your own overlays easily – now available for free! Quake 3 ported to libretro/retroarch RetroArch 1.8.1 released! Nintendo's Old Japanese Websites Are An Internet Time Trip Video Game Emulation: Piracy or Preservation? Retro Aladdin, Lion King games coming back in $100 cartridges Tarzan: Lord of the Jungle (SNES, Unreleased) New Kanye West song connects perfectly with Zelda’s ‘Gerudo Valley’ Super Mario Bros on the ZX Spectrum as a demo? Crazy! SonicGX - Sonic the Hedgehog running smoothly on an Amstrad The Fall Ball Game Bundle BackBit: A new emulated storage solution for your Commodore 64 Sega Plans To Release More Animated Sonic Shorts In The Future What happened if you tried to access a network file bigger than 2GB from MS-DOS? Dumbest Games to Collect #2: Earthbound Topic: Ghidra SEGA Genesis ROM Hacking with GHIDRA Ghidra Loader for Super Mario Bros. 3 NES ROM N64 ROM Decompiling With Ghidra Ghidra Sega Master System and Game Gear Loader Game Boy Ghidra Sleigh Disassembly instructions for Pikmin on GameCube Game Club Discussion Alien 2600 Luigi’s Mansion New Game Club Games Super Mario World Arch Rivals Facebook Question(s): “Name a retro game candy (real or fake) you’d like to get for Halloween?" Music By: I Love Lightning Bugs
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exim Flaw Exploited https://www.cybereason.com/blog/new-pervasive-worm-exploiting-linux-exim-server-vulnerability Yubico Recalling FIPS Certified Yubikeys https://www.yubico.com/support/security-advisories/ysa-2019-02/ Vulnerable Infusion Pumps https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/alaris-gateway-workstation-unauthorized-firmware Telegram DDoS Attack https://twitter.com/telegram/status/1138768124914929664 Ghidra Tips for IDA Users: Function Call Graphs https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+4+function+call+graphs/25032/ Joel Chapman: Security Consideration for Voice over Wifi (VoWifi) Systems https://www.sans.org/reading-room/whitepapers/telephone/paper/38945
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exim Flaw Exploited https://www.cybereason.com/blog/new-pervasive-worm-exploiting-linux-exim-server-vulnerability Yubico Recalling FIPS Certified Yubikeys https://www.yubico.com/support/security-advisories/ysa-2019-02/ Vulnerable Infusion Pumps https://www.bd.com/en-us/support/product-security-and-privacy/product-security-bulletins/alaris-gateway-workstation-unauthorized-firmware Telegram DDoS Attack https://twitter.com/telegram/status/1138768124914929664 Ghidra Tips for IDA Users: Function Call Graphs https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+4+function+call+graphs/25032/ Joel Chapman: Security Consideration for Voice over Wifi (VoWifi) Systems https://www.sans.org/reading-room/whitepapers/telephone/paper/38945
Jason, Herc, and Iolaus navigate the tricky transition between youth and adulthood in flashback episode which features Ghidra, Medea, and a whole lotta concern regarding who Herc is boinking. Mount Olympus is an episode by episode review of the smash 90s television programs "Hercules: The Legendary Journeys" and its spinoff "Xena: Warrior Princess," which still enjoy unparalleled cultural relevance today! Or ... at least they do in the hearts of our hosts. Kevin Sorbo, Lucy Lawless, Michael Hurst, Renee O'Connor and friends (along with fan favorite Bruce Campbell!) stomp, fight, and flirt their way through the New Zealand countryside - and we break it down week by week. Mount Olympus is a product of Retrograde Orbit Radio, and is brought to you by the following Retrograde Orbit Radio players: Our Own Hercules of Radio: Producer? Brian His Faithful Sidekick: Producer Mark The Xena of Podcasts: Meg Her Devoted Partner: Lucas
Searching a traveler’s phone or laptop is not an extension of a search made on a piece of luggage. As former commissioner of Ontario Ann Cavoukian said, “Your smartphone and other digital devices contain the most intimate details of your life: financial and health records.” In general, it’s also dangerous to connect laws made in accordance with the physical world to the digital space. But even with GDPR that’s aimed to protect consumer data, the law hasn’t taken action against any major technology firms such as Google or Facebook. It seems our relationship with technology might get worse before it gets better. Other articles discussed: How YouTube engineers eviscerated IE6 Attackers hosted phishing kits on GitHub Tool of the week: Ghidra is a software reverse engineering (SRE) framework
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
PoC Exploit for Windows 10 DHCP Client Vulnerability CVE-2019-0726 (russian) https://habr.com/ru/company/pt/blog/448378/ Oracle April 2019 Critical Patch Update https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html WiPro Breached Via Phishing Attacks https://krebsonsecurity.com/2019/04/experts-breach-at-it-outsourcing-giant-wipro/ IDA and GHydra Part 2 (Strings And Parameters) https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+2+strings+and+parameters/24848/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
PoC Exploit for Windows 10 DHCP Client Vulnerability CVE-2019-0726 (russian) https://habr.com/ru/company/pt/blog/448378/ Oracle April 2019 Critical Patch Update https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html WiPro Breached Via Phishing Attacks https://krebsonsecurity.com/2019/04/experts-breach-at-it-outsourcing-giant-wipro/ IDA and GHydra Part 2 (Strings And Parameters) https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+2+strings+and+parameters/24848/
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
GHidra vs. IDA https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+1+the+decompilerunreachable+code/24822/ TrendMicro Patch https://success.trendmicro.com/solution/1122250 Dovecot Patch https://dovecot.org/list/dovecot-news/2019-March/000403.html Apache CVE-2019-0211 Exploit https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache Using JavaScript in Exploits https://www.youtube.com/watch?v=HfpnloZM61I
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
GHidra vs. IDA https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+1+the+decompilerunreachable+code/24822/ TrendMicro Patch https://success.trendmicro.com/solution/1122250 Dovecot Patch https://dovecot.org/list/dovecot-news/2019-March/000403.html Apache CVE-2019-0211 Exploit https://github.com/cfreal/exploits/tree/master/CVE-2019-0211-apache Using JavaScript in Exploits https://www.youtube.com/watch?v=HfpnloZM61I
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Ghidra tips for IDA users: Automatic Comments for API Call Parameters https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+0+automatic+comments+for+API+call+parameters/24806/ Security Awareness Newsletter: Making Passwords Simple https://www.sans.org/security-awareness-training/resources/making-passwords-simple IRS Themed Phishing Emails https://www.proofpoint.com/us/threat-insight/post/tax-themed-email-campaigns-target-2019-filers Large Leak of Facebook User Data via 3rd Party App https://www.upguard.com/breaches/facebook-user-data-leak Arbitrary Command Execution in PostgreSQL https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Ghidra tips for IDA users: Automatic Comments for API Call Parameters https://isc.sans.edu/forums/diary/A+few+Ghidra+tips+for+IDA+users+part+0+automatic+comments+for+API+call+parameters/24806/ Security Awareness Newsletter: Making Passwords Simple https://www.sans.org/security-awareness-training/resources/making-passwords-simple IRS Themed Phishing Emails https://www.proofpoint.com/us/threat-insight/post/tax-themed-email-campaigns-target-2019-filers Large Leak of Facebook User Data via 3rd Party App https://www.upguard.com/breaches/facebook-user-data-leak Arbitrary Command Execution in PostgreSQL https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5
00:01:10 Sunshine CTF 00:10:27 Question Discussion: Opinions regarding CTF's vs. Real World Exploits 00:24:15 ENCRYPT CTF Discussion 00:31:25 Pwn2Own 2019 (P2O) and Tesla Hacking 00:41:25 Tricking Tesla Autopilot 00:56:45 Ghidra 9.0.1 Release 00:59:30 Commando VM 01:06:50 PoC||GTFO 0x19 01:13:20 ASUS Update Tool Backdoor 01:19:05 Windows Defender APC Code Injection Sensors 01:22:55 BSEA-1 - A Stream Cipher Backdooring Technique 01:32:40 LockerGoga Randomware Vaccination 01:37:40 Hearing your touch: A new acoustic side channel on smartphones 01:43:05 Keybase is not softer than TOFU 01:48:30 Exploitation Techniques and Defenses for Data-Oriented Attacks 01:56:00 Restricting Control Flow During Speculative Execution with Venkman Additional Links: Sunshine CTF Writeups Attacking Javascript Engines Phrack Article
00:00:50 Ghidra from XXE to RCE 00:08:50 Cutter (Radare2) Release 00:15:00 Daenerys IDA Pro and Ghidra Interoperability Framework 00:22:00 IDA Educational Release 00:39:35 Windows Defender on MacOS 00:59:20 A new Windows 10 KASLR Bypass 01:11:07 EVMFuzz Fuzzing Ethereum Virtual Machines 01:30:10 Researchers find 36 new security flaws in LTE Protocol 01:45:50 Facebook logging plaintext passwords Other Interesting Links: SecurityInnovation Blockchain CTF Analysis of a Chrome Zero-Day (CVE-2019-5786) Writeup
Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rockie Brockway, Steve Maxwell, Hans Lakhan, and David Boyd Title: Iranian-backed hackers stole data from major U.S. government contractor URL: https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986 Author: Dan De Luce and Courtney Kube Title: Beto O'Rourke Was Reportedly a Member of a 'Hacktivist' Group. What's That? URL: http://time.com/5552860/beto-orourke-hacktivist-cdc/ Author: By Patrick Lucas Title: NSA releases Ghidra, a free software reverse engineering toolkit URL: https://www.zdnet.com/article/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit/ Author: Catalin Cimpanu
3/21/19 POS Malware; Ghidra; PsMiner; Internet Weather | AT&T ThreatTraq
In this episode of The Unhashed Podcast: The NSA has open sourced their proprietary malware decompiler Ghidra. Was this worth all the privacy we’ve given up over the years? Craig Wright has left twitter, but will he stay left? And…Mark Karpeles is found innocent of all charges except for for records tampering which makes him unlikely to serve any more time. But it makes us wonder: did the 6 months he spent in solitary confinement serve as more than enough punishment?
Thomas Daede joined us after the Mountain View Reverse Engineering Meetup to talk about Ghidra. Ghidra is the NSA’s newly-released-to-the-public software reverse engineering tool. The source has not yet been released, but there’s a Ghidra Github placeholder. Some of the other things we talked about: Application Binary Interfaces Dissasemblers The Sharp X68000 computer IDA radare Virt-manager objdump Thomas also mentioned @marcan42’s example of comparing his own PowerPC code with Ghidra’s decompiled output. CrowdSupply’s Teardown conference is coming up in Portland, June 21-23. BlackHoodie will be back in the SF Bay Area in April. Women in Security and Privacy (@wisporg) has a scholarship program for DEFCON. You can apply for the scholarship online. They’ll cover the DEFCON ticket as well as a $500 stipend for travel/accommodation. If you want to help, you can donate here. Thanks to @RachelTobac for spreading the word! As of this episode, there are 58 scholarships available! Jen mentioned @pinkflawd’s tweet about ELF binaries. Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Chrome and Windows 7 zero days are being actively exploited, The NSA releases Ghidra into the wild for free, and Democrats Want to Restore Net Neutrality! All that coming up now on ThreatWire. #threatwire #hak5 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆Our Site → https://www.hak5.orgShop → https://www.hakshop.comSubscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1Support → https://www.patreon.com/threatwireContact Us → http://www.twitter.com/hak5Threat Wire RSS → https://shannonmorse.podbean.com/feed/Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubsHost: Darren Kitchen → https://www.twitter.com/hak5darrenHost: Mubix → http://www.twitter.com/mubix-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Links:Chrome Zero Days:https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.htmlhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5786https://www.zdnet.com/article/google-chrome-zero-day-was-used-together-with-a-windows-7-zero-day/https://security.googleblog.com/2019/03/disclosing-vulnerabilities-to-protect.htmlhttps://www.wired.com/story/turn-on-auto-updates-everywhere/ Ghidra:https://motherboard.vice.com/en_us/article/panvm7/nsa-releases-ghidra-for-free-game-changerhttps://www.zdnet.com/article/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit/https://ghidra-sre.org/https://github.com/nationalsecurityagencyhttps://www.cyberscoop.com/ghidra-nsa-tool-public/https://www.wired.com/story/nsa-ghidra-open-source-tool/ New Bill to restore net neutrality:https://motherboard.vice.com/en_us/article/d3mk5w/democrats-unveil-new-bill-to-fully-restore-net-neutralityhttps://energycommerce.house.gov/sites/democrats.energycommerce.house.gov/files/documents/Save%20the%20Internet%20Act%20Legislative%20Text.pdfhttps://arstechnica.com/tech-policy/2019/01/net-neutrality-advocates-confident-about-beating-fcc-as-case-heads-to-court/ Photo credit:The NSA, lol.
00:00:00 Intro / General Discussion 00:00:55 Ghidra Overview (Pros, Cons) 00:30:20 Ghidra JDWP Debug Port 'Backdoor' Discussion 00:38:05 Ghidra and National Security 00:52:15 "Finding Unicorns: When The C++ Compiler Writes the Vuln" Discussion 01:06:15 "Windows 7 may insecurely load Dynamic Link Libraries" Discussion 01:21:40 "Exploiting Car Alarms" Discussion 01:45:05 XNU (Mac OS) Copy-on-Write Behavior Bypass Zero-Day Discussion 02:03:15 Chrome Zero-Day Discussion
A big week in cybersecurity means an extra big podcast. We talk about it all: Ghidra, Backstory, digital trust, smart house hacks, -- it's all in here. We talk to Christian Lees, CISO for InfoArmor. Christian gets into his role scouring the dark web, figuring out how people’s data ended up on dark web forums. Speaking of the dark web, we also are going to talk to RunSafe CEO Joe Saunders — RunSafe and CyberScoop launched the RunSafe Pwn Index this week. What is that, you ask? Listen and we'll tell you, duh.
233 • Hoy os cuento qué es ghidra, una anécdota acerca de un troyano, y también hablo del legado digital (https://twitter.com/fernand0/status/1103232029108432897?s=21) • Artículo acerca de Ghidra: https://www.wired.com/story/nsa-ghidra-open-source-tool/ • El troyano (o su falso positivo) en ghidra: https://github.com/NationalSecurityAgency/ghidra/issues/85 | Anchor: https://anchor.fm/gvisoc • Twitter: https://twitter.com/gvisoc • Telegram: https://t.me/gvisoc
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Comcast Uses same "0000" PIN For All Number Porting Requests https://nakedsecurity.sophos.com/2019/03/05/comcast-security-nightmare-default-0000-pin-on-everybodys-account/ NSA Releases Ghidra Reverse Analysis Tool https://ghidra-sre.org/ Recent Google Chrome Vulnerability Being Exploited https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html?m=1 Android Monthly Security Bulletin https://source.android.com/security/bulletin/2019-03-01
The National Security Agency develops advanced hacking tools in-house for both offense and defense—which you could probably guess even if some notable examples hadn't leaked in recent years. But on Tuesday at the RSA security conference in San Francisco, the agency chose for the first time demonstrated Ghidra, a refined internal tool that it has chosen to open source.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Comcast Uses same "0000" PIN For All Number Porting Requests https://nakedsecurity.sophos.com/2019/03/05/comcast-security-nightmare-default-0000-pin-on-everybodys-account/ NSA Releases Ghidra Reverse Analysis Tool https://ghidra-sre.org/ Recent Google Chrome Vulnerability Being Exploited https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html?m=1 Android Monthly Security Bulletin https://source.android.com/security/bulletin/2019-03-01
Tyler, Chris and Scott talk about three more films from the Showa period. Mothra vs Godzilla, Ghidra the Three Headed Monster and Invasion of Astro Monster.
Tyler, Chris and Scott talk about three more films from the Showa period. Mothra vs Godzilla, Ghidra the Three Headed Monster and Invasion of Astro Monster.
De Amerikaanse geheime dienst NSA gaat software vrijgeven waarmee je de werking van bijvoorbeeld computerprogramma's of malware kunt achterhalen. Het gaat om een tool die GHIDRA heet. De grote vraag is waarom de Amerikaanse geheime dienst ervoor kiest om deze software vrij te geven.
A daily look at the relevant information security news from overnight.Episode 58 - 09 January, 2019No Flash security update - https://www.bleepingcomputer.com/news/security/adobe-releases-january-2019-security-updates-none-for-flash-player/Microsoft patches 50 - https://www.zdnet.com/article/microsoft-january-2019-patch-tuesday-fixes-50-vulnerabilities/Intel Patches 5 - https://threatpost.com/intel-patches-privilege-escalation-bugs/140665/G-Suite adds admin help - https://www.zdnet.com/article/g-suite-update-warns-you-when-someone-is-exporting-your-companys-data/NSA releases Ghidra - https://www.theinquirer.net/inquirer/news/3068875/nsa-will-open-source-a-tool-for-malware-disassembly-and-reverse-engineering
Hundreds of German Politicians have personal data leaked, lawsuit over Weather Channel App's alleged abuse of user location data, and NSA to release GHIDRA reverse engineering tool at RSAConference 2019 on episode 195 of our daily cybersecurity podcast.
Ai-yi-yi-yi-yi! Rita Repulsa has convinced Godzilla to attack Angel Grove! The Power Rangers Zord up to defend their hometown against this walking nuclear disaster! Which nerd icon will prevail?