Search n00bz.net
Tuesday
Sep072010

Dilbert: I guess I am not going to write that ebook after all!

Tuesday
Sep072010

HackMiami Buffer Overflow Slide Deck

I have posted the slide deck from this weekend's HackMiami meeting.  You can download them here!

I also wanted to include some sites that are great resources regarding Buffer Overflows and Exploit writing.

http://x9090.blogspot.com/2010/03/tutorial-exploit-writting-tutorial-from.html

http://grey-corner.blogspot.com/2010/01/beginning-stack-based-buffer-overflow.html

http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

 

Happy Hacking!

Wednesday
Sep012010

Microsoft says "Thanks for your exploit code!"

It's not unusual for hackers and script kiddies to crash their Windows systems while trying to write a malicious code. It's apparently also not unusual for them to send that malicious code right along to Microsoft when prompted. According to Microsoft senior security architect Rocky Heckman, when a "hacker's system crashes in Windows, as with all typical Windows crashes, the user would be prompted to send the error details - including the malicious code - to Microsoft. The funny thing is that many say yes." He explains further: People have sent us their virus code when they're trying to develop their virus and they keep crashing their systems. It's amazing how much stuff we get.
Tuesday
Aug312010

Hackers break Quantum Encryption using MiTM

From PopSci:

Quantum Hackers Use Lasers to Crack Powerful Encryption Without Leaving a Trace

Quantum cryptography is one of the most secure known means of transmitting data, due to the fact that even if a third party does intercept a quantum signal, that interference changes the encryption key, making the tampering apparent to parties at both ends. But a handful of quantum hackers at Norwegian University of Science and Technology in Trondheim recently performed successful hacks of two commercial quantum cryptographic systems -- and they did so without leaving a trace.

Quantum encryption is based on the notion that you cannot take measurements of a quantum system without in some way disturbing it. A sender uses standard values of zeros and ones. That key is encoded into a beam of light using two different quantum states of photons. The receiver has a detector that measures the quantum states of the incoming photons. Anyone who messes with the signal in between will change it in some way, making it apparent to the sender and receiver that someone tampered with the signal.

http://www.popsci.com/technology/article/2010-08/quantum-hackers-use-lasers-crack-quantum-encryption-scheme-leaving-no-trace

Monday
Aug302010

Kidnapping Tetris

Tetris is one of the few games that achieves ultimate popularity. It is remarkably simple, yet remarkably difficult. It's been ported to every computer and game console known to man.

I have it on every device I own from my iPhone, to my Wii and even my Calculator.

Besides that, it also led to one of the most interesting legal battles in the history of video games, leading to the famed Tengen version of Tetris and to the downfall of a few companies. It's a pretty cool story, so let's get down to business. Click here to fire up the time machine and head back to 1985....