<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5798071228088816152</id><updated>2024-09-09T04:23:44.652-07:00</updated><category term="badcoded"/><category term="Secure Coding"/><category term="risk"/><category term="video"/><category term="DEP"/><category term="bug"/><category term="hitb2005"/><category term="ret"/><category term="Matt Conover"/><category term="User Supplied Format String"/><category term="Windows Heap"/><category term="bounded mdoel checking"/><category term="bypass"/><category term="history"/><category term="integer"/><category term="java"/><category term="malware"/><category term="phrack"/><category term="tools"/><category term="virtualization"/><category term="webapp"/><category term="webbrowser"/><title type='text'>badcoded</title><subtitle type='html'>helping to exploit</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>31</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-2774132011308223701</id><published>2010-06-01T13:07:00.000-07:00</published><updated>2010-06-01T13:34:06.269-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="history"/><title type='text'>Memory Corruption and Hacker Folklore</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://ilm.thinkst.com/folklore/index.shtml&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 437px; height: 170px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4zWdjVN6mV8sALwiW9uXU5MQKU9XEoRfhuuEU9eYwvPdoHGVOTmLL0H0zeQyvdIKDbJa_x9nZOlbwn2p3a-2_iUYf36fyPXuLDOuIfW73tKUZGWpmcDYwYBV-yO98zSYQTRWfwiQwjb0/s320/tl.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5477905385474865650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Nice work by &lt;span class=&quot;post-author vcard&quot;&gt;&lt;span class=&quot;fn&quot;&gt;haroon from &lt;/span&gt;&lt;/span&gt;Thinkst Applied Research, he is making an interactive &lt;a href=&quot;http://ilm.thinkst.com/folklore/index.shtml&quot;&gt;timeline&lt;/a&gt; of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this &lt;a href=&quot;http://ilm.thinkst.com/folklore/form.shtml&quot;&gt;form&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/2774132011308223701/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/2774132011308223701' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2774132011308223701'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2774132011308223701'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2010/06/memory-corruption-and-hacker-folklore.html' title='Memory Corruption and Hacker Folklore'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4zWdjVN6mV8sALwiW9uXU5MQKU9XEoRfhuuEU9eYwvPdoHGVOTmLL0H0zeQyvdIKDbJa_x9nZOlbwn2p3a-2_iUYf36fyPXuLDOuIfW73tKUZGWpmcDYwYBV-yO98zSYQTRWfwiQwjb0/s72-c/tl.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-4955376831214437832</id><published>2009-06-11T00:11:00.000-07:00</published><updated>2009-06-11T00:29:51.488-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="DEP"/><category scheme="http://www.blogger.com/atom/ns#" term="ret"/><title type='text'>Bypassing DEP on Win2003 SP2</title><content type='html'>David Kennedy “ReL1K” published&lt;br /&gt;Bypassing Hardware based Data Execution Prevention on Windows 2003 Service Pack 2 &lt;a href=&quot;http://milw0rm.org/papers/339&quot;&gt;PDF&lt;/a&gt; (497KB)&lt;br /&gt;&lt;br /&gt;Good, you can learn from David experience writing an exploit for Windows 2003 SP2. This is the kind of research you have to do to exploit a simple buffer overflow in modern operating systems with protections. What he does manually in this article sometimes is harder or impossible without the help of some automated tool to analyze thousand of different system modules.</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/4955376831214437832/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/4955376831214437832' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4955376831214437832'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4955376831214437832'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2009/06/bypassing-dep-on-win2003-sp2.html' title='Bypassing DEP on Win2003 SP2'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-2065170772630704765</id><published>2009-04-17T08:42:00.000-07:00</published><updated>2009-04-17T08:45:40.794-07:00</updated><title type='text'>Project Shellcode</title><content type='html'>&lt;blockquote&gt;The first stage of Project Shellcode aims to become the knowledge base for all shellcode related resources, including white papers, tutorials, tools, links, assembly code, and of course shellcode.&lt;/blockquote&gt;&lt;br /&gt;&lt;a href=&quot;http://projectshellcode.com&quot;&gt;http://projectshellcode.com/&lt;/a&gt;&lt;br /&gt;Is not clear if the project is active or not.</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/2065170772630704765/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/2065170772630704765' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2065170772630704765'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2065170772630704765'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2009/04/project-shellcode.html' title='Project Shellcode'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-1576397001402881367</id><published>2009-01-02T08:50:00.000-08:00</published><updated>2009-06-11T00:30:11.088-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="DEP"/><category scheme="http://www.blogger.com/atom/ns#" term="ret"/><title type='text'>Return-Oriented Programming: Exploits Without Code Injection</title><content type='html'>&lt;blockquote&gt;...We describe return-oriented programming, a generalization of return-into-libc that allows an attacker to undertake arbitrary, Turing-complete computation without injecting code.New computations are constructed by linking together code snippets that end with a “ret” instruction. The ret instructions allow an attacker who controls the stack to chain    instruction sequences together. Because the executed code is stored in memory marked executable, W^X and DEP will not prevent it from running.&lt;br /&gt;&lt;a href=&quot;http://www.cse.ucsd.edu/%7Ehovav/talks/blackhat08.html&quot;&gt;...&lt;/a&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;a href=&quot;http://www.cse.ucsd.edu/%7Ehovav/dist/blackhat08.pdf&quot;&gt;PDF&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/1576397001402881367/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/1576397001402881367' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1576397001402881367'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1576397001402881367'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2009/01/return-oriented-programming-exploits.html' title='Return-Oriented Programming: Exploits Without Code Injection'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-729306555996249711</id><published>2008-11-02T08:08:00.000-08:00</published><updated>2008-11-02T08:23:34.440-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="virtualization"/><title type='text'>Adventures with a certain Xen vulnerability - Rafal Wojtczuk</title><content type='html'>&lt;pre&gt;  Rafal Wojtczuk paper about the exploitation of a &lt;a href=&quot;http://en.wikipedia.org/wiki/Xen&quot;&gt;XEN&lt;/a&gt; vulnerability &lt;/pre&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;The Evil Hacker escapes from DomU and  gets  into  Dom0.   Using  clever&lt;br /&gt;ret-into-libc technique he succeeds with his attack on x86 architecture,&lt;br /&gt;despite the NX and ASLR deployed in Dom0 OS (Fedora Core 8).   The  Evil&lt;br /&gt;Hacker is  also  not  discouraged  by the   fact   that   the   target&lt;br /&gt;OS has SELinux protection enabled - he demonstrates how  the  particular&lt;br /&gt;SELinux policy for Xen,  used  by  default  on FC8,  can  be  bypassed.&lt;br /&gt;Ultimately he gets full root  access  in  Dom0.   Rafal  also  discusses&lt;br /&gt;variation of the exploitation on  x86_64  architecture -  he  partially&lt;br /&gt;succeeds, but his x64 exploit doesn&#39;t  work  in  certain  circumstances.&lt;br /&gt;...&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://invisiblethingslab.com/pub/xenfb-adventures-10.pdf&quot;&gt;PDF&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/729306555996249711/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/729306555996249711' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/729306555996249711'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/729306555996249711'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/11/adventures-with-certain-xen.html' title='Adventures with a certain Xen vulnerability - Rafal Wojtczuk'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-8100849881638469907</id><published>2008-09-15T17:03:00.000-07:00</published><updated>2008-09-15T17:08:29.972-07:00</updated><title type='text'>writing a .NET Security Exploit PoC...mmm?</title><content type='html'>&lt;a href=&quot;http://weblog.ikvm.net/CommentView.aspx?guid=3cc8beef-3424-488d-8429-50e244f15ccc&quot;&gt;Let&#39;s start out with some convenient types that allow bit twiddeling once we&#39;ve subverted the type system....&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;well, not exactly but interesting anyway.</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/8100849881638469907/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/8100849881638469907' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/8100849881638469907'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/8100849881638469907'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/09/writing-net-security-exploit-pocmmm.html' title='writing a .NET Security Exploit PoC...mmm?'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-8600153952081890268</id><published>2008-05-14T22:45:00.000-07:00</published><updated>2008-05-14T23:26:21.637-07:00</updated><title type='text'>Misplaced Trust: Kerberos 4 Session Keys (1997)</title><content type='html'>Again, a 10 years old paper in badcoded. Ignore the past, &lt;a href=&quot;http://wiki.debian.org/SSLkeys&quot;&gt;repeat mistakes&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://citeseer.ist.psu.edu/dole97misplaced.html&quot;&gt;Misplaced Trust: Kerberos 4 Session Keys (1997)&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Progress, far from consisting in change, depends on retentiveness. When change is absolute there remains no being to improve and no direction is set for possible improvement: and when experience is not retained, as among savages, infancy is perpetual. Those who cannot remember the past are condemned to repeat it. In the first stage of life the mind is frivolous and easily distracted, it misses progress by failing in consecutiveness and persistence. This is the condition of children and barbarians, in which instinct has learned nothing from experience.&lt;/blockquote&gt;&lt;br /&gt;George Santayana, The Life of Reason, Volume 1, 1905</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/8600153952081890268/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/8600153952081890268' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/8600153952081890268'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/8600153952081890268'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/05/misplaced-trust-kerberos-4-session-keys.html' title='Misplaced Trust: Kerberos 4 Session Keys (1997)'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-7668598903625122609</id><published>2008-04-16T22:08:00.000-07:00</published><updated>2008-04-16T22:19:17.318-07:00</updated><title type='text'>PHRACK #65</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.phrack.org/&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 174px; height: 64px;&quot; src=&quot;http://phrack.org/img/phrack-logo.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;April 2008&lt;br /&gt;by The Circle of Lost Hackers&lt;/span&gt;&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;0x01 Introduction                                                      TCLH&lt;br /&gt;0x02 Phrack Prophile of The UNIX Terrorist                             TCLH&lt;br /&gt;0x03 Phrack World News                                                 TCLH&lt;br /&gt;0x04 Stealth Hooking: another way to subvert the Windows kernel     mxatone&lt;br /&gt;                                                                  ivanlefou&lt;br /&gt;0x05 Clawing holes in NAT with UPnP                            felinemenace&lt;br /&gt;0x06 The only laws on Internet are assembly and RFCs                  Julia&lt;br /&gt;0x07 Hacking the System Management Mode       BSDaemon, coideloko, d0nand0n&lt;br /&gt;0x08 Mystifying the debugger for ultimate stealthness              halfdead&lt;br /&gt;0x09 Australian Restricted Defense Networks and FISSO              The Finn&lt;br /&gt;0x0a Phook - The PEB Hooker                                  shearer &amp; dreg&lt;br /&gt;0x0b Hacking the $49 Wifi Finder                                openschemes&lt;br /&gt;0x0c The art of exploitation: Samba WINS stack overflow         max_packetz&lt;br /&gt;0x0d The Underground Myth                                         anonymous&lt;br /&gt;0x0e Hacking your brain: Artificial Conciousness                         -C&lt;br /&gt;0x0f International scenes                                           various&lt;br /&gt;&lt;/pre&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://phrack.org/issues.html?issue=65&quot;&gt;Phrack #65  &lt;/a&gt;&lt;/div&gt; &lt;div&gt;&lt;a href=&quot;http://phrack.org/archives/tgz/phrack65.tar.gz&quot;&gt; Download .tgz&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/7668598903625122609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/7668598903625122609' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7668598903625122609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7668598903625122609'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/04/phrack-65.html' title='PHRACK #65'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-940986289667718269</id><published>2008-04-14T15:10:00.000-07:00</published><updated>2008-04-16T22:07:09.766-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="bug"/><title type='text'>Aplication-Specific Attacks - Leveraging the ActionScript Virtual Machine</title><content type='html'>&lt;blockquote&gt;Memory corruption vulnerabilities are becoming increasingly difficult to exploit, largely due to the protection mechanisms being integrated into most modern operating systems. As general protection mechanisms evolve, attackers are engaging in more specific, low-level application-targeted attacks. In order to refine general countermeasures (or at least raise awareness of their shortcomings), it is important to first understand how memory corruption vulnerabilities are exploited in some unique scenarios. &lt;/blockquote&gt;&lt;br /&gt;&lt;a href=&quot;http://taossa.com/index.php/2008/04/12/exploiting-flash-reliably/&quot;&gt;[...]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf&quot;&gt;Aplication-Specific Attacks - Leveraging the ActionScript Virtual Machine by Mark Dowd PDF&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/940986289667718269/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/940986289667718269' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/940986289667718269'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/940986289667718269'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/04/aplication-specific-attacks-leveraging.html' title='Aplication-Specific Attacks - Leveraging the ActionScript Virtual Machine'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-5070365394794282385</id><published>2008-04-05T21:58:00.000-07:00</published><updated>2008-04-05T22:12:30.862-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="integer"/><title type='text'>gcc silently discards some wraparound checks...buf+len &lt; buf?</title><content type='html'>&lt;a href=&quot;http://blogs.msdn.com/david_leblanc/archive/2008/04/04/evil-compiler-tricks-and-checking-for-pointer-math.aspx&quot;&gt;David LeBlanc&#39;s Web Log&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://www.kb.cert.org/vuls/id/162289&quot;&gt;Vulnerability Note VU#162289&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Basically, what it says is that code which looks like this:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;        char *buf;&lt;br /&gt;        int len;&lt;br /&gt;&lt;br /&gt;gcc will assume that buf+len &gt;= buf.&lt;br /&gt;&lt;br /&gt;As a result, code that performs length checks similar to the following:&lt;br /&gt;&lt;br /&gt;len = 1&lt;&lt;30;&lt;br /&gt;[...]&lt;br /&gt;if(buf+len &lt; buf)  /* length check */&lt;br /&gt;  [...perform some manipulation on len...]&lt;br /&gt;&lt;br /&gt;are compiled away by these versions of gcc &lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/5070365394794282385/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/5070365394794282385' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/5070365394794282385'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/5070365394794282385'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2008/04/gcc-silently-discards-some-wraparound.html' title='gcc silently discards some wraparound checks...buf+len &lt; buf?'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-1834380283284486889</id><published>2008-01-01T18:06:00.000-08:00</published><updated>2008-02-27T14:57:20.623-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="User Supplied Format String"/><title type='text'>User Supplied Format String Vulnerability - everything ever written</title><content type='html'>&lt;a href=&quot;http://badcoded.blogspot.com/2007/12/user-supplied-format-string.html&quot;&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 102);&quot;&gt;2005&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/usfs_perl.txt&quot;&gt;Format String Vulnerabilities in Perl Programs&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Steve Christey&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 153);&quot;&gt;2002&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/doc/p59-0x07.txt&quot;&gt;Advances in format string exploitation&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Gerardo Richarte, Ricardo Quesada&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/remotefs.txt&quot;&gt;Howto remotely and automatically exploit a format bug&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Frédéric Raynal&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;2001&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/formatstring-1.2.pdf&quot;&gt;Exploiting Format Strings Vulnerabilities&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;scut team-teso&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/teso-fs1-1.pdf&quot;&gt;v1.1&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/formatstring-1.2.pdf&quot;&gt;v1.2&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/alpha-fmtstr.txt&quot;&gt;Format String Attack on alpha system&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Seunghyun Seo (truefinder)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/NN-formats.txt&quot;&gt;Format String Technique&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;sloth@nopninjas.com&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/format-bug-analysis.pdf&quot;&gt;Analysis of Format String Bugs&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Andreas Thuemmel&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/fs-usenix01.pdf&quot;&gt;Detecting Format String Vulnerabilities with Type Qualifiers&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;David Wagner&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Large-Scale Analysis of Format String Vulnerabilities in Debian Linux&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;David Wagner&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/chris-fs-en.html&quot;&gt;What are format bugs ?&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Christophe BLAESS Christophe GRENIER Frédéreric RAYNAL&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/chris-fs-fr.html&quot;&gt;French&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(51, 204, 255);&quot;&gt;2000&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/kalou-formats.txt&quot;&gt;More info on format bugs&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Pascal Bouchareine&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/kalou-formats-es.txt&quot;&gt;Español&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/tn-usfs.pdf&quot;&gt;Format String Attacks&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Tim Newsham&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/tn-usfs.txt&quot;&gt;TXT&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/lamagra-format.txt&quot;&gt;Format Bugs: What are they, Where did they come from,...How to exploit them&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Lamagra&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/lamagra-format-es.txt&quot;&gt;Español&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/rdCpaper-fb.txt&quot;&gt;Paper sobre format bugs&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;venomous&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://julianor.tripod.com/bc/locale_sol.txt&quot;&gt;Exploiting the Libc Locale Subsystem Format String Vulnerability on Solaris/SPARC&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;Solar Eclipse&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/100_Most_Influential_Books_Ever_Written&quot;&gt;100 Most Influential Books Ever Written&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;See: &lt;a href=&quot;http://badcoded.blogspot.com/2007/12/user-supplied-format-string.html&quot;&gt; scut/teso-team Format String paper&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/1834380283284486889/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/1834380283284486889' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1834380283284486889'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1834380283284486889'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/user-supplied-format-string_14.html' title='User Supplied Format String Vulnerability - everything ever written'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-63796113443354189</id><published>2007-12-28T11:01:00.000-08:00</published><updated>2007-12-28T11:16:00.476-08:00</updated><title type='text'>New Microsoft Security Vulnerability Research and Defense blog</title><content type='html'>&lt;span style=&quot;font-size:100%;&quot;&gt;New Microsoft technical blog about security vulnerabilities &lt;a href=&quot;http://blogs.technet.com/swi/rss.xml&quot;&gt;RSS&lt;/a&gt; &lt;/span&gt;&lt;span style=&quot;;font-family:&#39;Arial&#39;,&#39;sans-serif&#39;;font-size:100%;&quot;  &gt;&lt;blockquote&gt;We are excited to have this outlet to share more in-depth technical information about vulnerabilities serviced by MSRC security updates and ways you can protect your organization from security vulnerabilities. You can read much more about the goals of the blog and about the&lt;span style=&quot;color: rgb(31, 73, 125);&quot;&gt; &lt;/span&gt;SWI teams contributing to the blog in our “About” link: &lt;a href=&quot;http://blogs.technet.com/swi/about.aspx&quot; mce_href=&quot;http://blogs.technet.com/swi/about.aspx&quot;&gt;&lt;span style=&quot;color: rgb(128, 0, 128);&quot;&gt;http://blogs.technet.com/swi/about.aspx&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/63796113443354189/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/63796113443354189' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/63796113443354189'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/63796113443354189'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/new-microsoft-security-vulnerability.html' title='New Microsoft Security Vulnerability Research and Defense blog'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-5303036629283814316</id><published>2007-12-20T14:23:00.000-08:00</published><updated>2007-12-20T14:35:51.108-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="Matt Conover"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Heap"/><title type='text'>Double Free Vulnerabilities on Windows</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span class=&quot;author&quot;&gt;by Matt Conover&lt;/span&gt; 2007&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To learn to exploit real &lt;a href=&quot;http://en.wikipedia.org/wiki/Dynamic_memory_allocation&quot;&gt;heap memory&lt;/a&gt; corruption vulnerabilities on Windows one of the things you have to do is to read every Matt Conover&#39;s publication. The next are two posts in the &lt;a href=&quot;http://www.symantec.com/enterprise/security_response/weblog/sd_subscribe.html&quot;&gt;Symantec Security Response Blog&lt;/a&gt; about double free() bugs. More articles and publications by him will be posted later in this blog.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;In light of the recent CSRSS double free bug, I wanted to provide some information on the exploitation of double frees on Windows on XP SP2 and later. Prior to XP SP2, double frees were trivial to exploit, but now the security cookie (in each heap chunk) and safe unlinking checks make it more difficult to exploit. So this blog entry will discuss the exploitability on XP SP2 and later heap implements.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;a href=&quot;http://www.symantec.com/enterprise/security_response/weblog/2007/01/double_free_vulnerabilities_pa.html&quot;&gt;Double Free Vulnerabilities Part 1&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.symantec.com/enterprise/security_response/weblog/2007/01/double_free_vulnerabilities_pa_1.html&quot;&gt;Double Free Vulnerabilities Part 2&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/5303036629283814316/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/5303036629283814316' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/5303036629283814316'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/5303036629283814316'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/double-free-vulnerabilities-on-windows.html' title='Double Free Vulnerabilities on Windows'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-3686079518266125553</id><published>2007-12-18T18:06:00.000-08:00</published><updated>2007-12-17T20:49:37.025-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><title type='text'>Smashing The Modern Stack For Fun And Profit</title><content type='html'>Craig J. Heffner article about the problems he found while reading and following the examples in  &lt;a href=&quot;http://badcoded.blogspot.com/2007/12/smashing-stack-for-fun-and-profit.html&quot;&gt;Smashing The Stack For Fun And Profit &lt;/a&gt; using a modern Linux system.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&quot;...the &lt;a target=&quot;_blank&quot; href=&quot;http://gcc.gnu.org/&quot;&gt;GNU C Compiler&lt;/a&gt; (gcc) has evolved since 1998, and as a result, many people are left wondering why they can&#39;t get the examples to work for them, or if they do get the code to work, why they had to make the changes that they did. Having these same problems myself, and being unable to find an updated version of Aleph One&#39;s document on the web, I set out to identify the source of these variations on my own. &lt;a href=&quot;http://www.ethicalhacker.net/content/view/122/2/&quot;&gt;...&lt;/a&gt;&quot;&lt;br /&gt;&lt;a href=&quot;http://www.ethicalhacker.net/content/view/122/2/&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;      Smashing The &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Modern&lt;/span&gt; &lt;span style=&quot;font-size:85%;&quot;&gt;Stack For Fun And Profit&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/3686079518266125553/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/3686079518266125553' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3686079518266125553'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3686079518266125553'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/smashing-modern-stack-for-fun-and.html' title='Smashing The Modern Stack For Fun And Profit'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-159047915382472194</id><published>2007-12-16T17:14:00.000-08:00</published><updated>2007-12-16T17:31:04.549-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><category scheme="http://www.blogger.com/atom/ns#" term="tools"/><title type='text'>Valgrind 3.3.0 released</title><content type='html'>&lt;p&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://valgrind.org/&quot;&gt;&lt;img style=&quot;border: medium none ; margin: 0pt 0pt 10px 10px; float: left; cursor: pointer; width: 100px; height: 161px;&quot; src=&quot;http://valgrind.org/images/st-george_sm.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;Valgrind is an  &lt;a href=&quot;http://valgrind.org/gallery/awards.html&quot;&gt;award-winning&lt;/a&gt;  suite of tools for debugging and profiling Linux programs. With the tools that come with Valgrind, you can automatically detect many memory management and threading bugs, avoiding hours of frustrating bug-hunting, making your programs more stable. You can also perform detailed profiling, to speed up and reduce memory use of your programs.&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;p&gt;The Valgrind distribution currently includes four tools: a memory error detector, a cache (time) profiler, a call-graph profiler, and a heap (space) profiler.  It runs on the following platforms: X86/Linux, AMD64/Linux, PPC32/Linux, PPC64/Linux.&lt;/p&gt;&lt;p&gt; The main excitement in 3.3.0 is new and improved tools.  Helgrind&lt;br /&gt;works again, Massif has been completely overhauled and much improved,&lt;br /&gt;Cachegrind now does branch-misprediction profiling, and a new category&lt;br /&gt;of experimental tools has been created, containing two new tools:&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://valgrind.org/info/news.html&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 83px; height: 63px; border:none;&quot; src=&quot;http://valgrind.org/images/dragon_sm.png&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Omega and DRD.  There are many other smaller improvements. [&lt;a href=&quot;http://valgrind.org/docs/manual/dist.news.html&quot;&gt;...&lt;/a&gt;]&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/159047915382472194/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/159047915382472194' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/159047915382472194'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/159047915382472194'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/valgrind-330-released.html' title='Valgrind 3.3.0 released'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-1848245859653963275</id><published>2007-12-16T16:03:00.001-08:00</published><updated>2007-12-16T16:23:06.682-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="phrack"/><title type='text'>Phrack Magazine #64</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.phrack.org/&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 174px; height: 64px;&quot; src=&quot;http://phrack.org/img/phrack-logo.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;May 2007&lt;br /&gt;by The Circle of Lost Hackers&lt;/span&gt;&lt;br /&gt;&lt;pre&gt;&lt;br /&gt;0x01 Introduction                                 The Circle of Lost Hackers&lt;br /&gt;0x02 Phrack Prophile of the new editors           The Circle of Lost Hackers&lt;br /&gt;0x03 Phrack World News                            The Circle of Lost Hackers&lt;br /&gt;0x04 A brief history of the Underground scene     The Circle of Lost Hackers&lt;br /&gt;0x05 Hijacking RDS TMC traffic information signal                      lcars&lt;br /&gt;                                                                  danbia&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;0x06 &lt;/span&gt;Attacking the Core: Kernel Exploitation Notes                      twiz&lt;br /&gt;                                                                sgrakkyu&lt;br /&gt;0x07 The revolution will be on YouTube                                gladio&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;0x08&lt;/span&gt; Automated vulnerability auditing in machine code           Tyler Durden&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;0x09&lt;/span&gt; The use of set_head to defeat the wilderness                       g463&lt;br /&gt;0x0a Cryptanalysis of DPA-128                                           sysk&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;0x0b&lt;/span&gt; Mac OS X Wars - A XNU Hope                                         nemo&lt;br /&gt;0x0c Hacking deeper in the system                                   scythale&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;0x0d&lt;/span&gt; The art of exploitation: Autopsy of cvsxpl                  Ac1dB1tch3z&lt;br /&gt;0x0e Know your enemy: Facing the cops                                  Lance&lt;br /&gt;0x0f Blind TCP/IP hijacking is still alive                               Lkm&lt;br /&gt;0x10 Hacking your brain: The projection of consciousness             keptune&lt;br /&gt;0x11 International scenes                                            Various&lt;/pre&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://phrack.org/issues.html?issue=64&quot;&gt;Phrack #64  &lt;/a&gt;&lt;/div&gt; &lt;div&gt;&lt;a href=&quot;http://phrack.org/archives/tgz/phrack64.tar.gz&quot;&gt; Download .tgz&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/1848245859653963275/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/1848245859653963275' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1848245859653963275'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/1848245859653963275'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/phrack-magazine-64.html' title='Phrack Magazine #64'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-2383687464947970272</id><published>2007-12-16T15:25:00.000-08:00</published><updated>2007-12-16T15:26:20.779-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>Putting risk in perspective: Do people make better decisions when they understand average risk?</title><content type='html'>&lt;p&gt;&lt;br /&gt;&lt;a href=&quot;http://www.physorg.com/news116766739.html&quot;&gt;Putting risk in perspective: Do people make better decisions when they understand average risk?&lt;/a&gt; from &lt;a href=&quot;http://www.physorg.com&quot; title=&quot;Science and technology news&quot;&gt;PhysOrg.com&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;If there were a pill that would cut your risk of breast cancer in half, would you take it? What if you were told your risk of breast cancer was already below average?&lt;br /&gt;&lt;br /&gt;[&lt;a href=&quot;http://www.physorg.com/news116766739.html&quot;&gt;...&lt;/a&gt;]&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/2383687464947970272/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/2383687464947970272' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2383687464947970272'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/2383687464947970272'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/putting-risk-in-perspective-do-people.html' title='Putting risk in perspective: Do people make better decisions when they understand average risk?'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-3983957045797458033</id><published>2007-12-16T11:41:00.001-08:00</published><updated>2007-12-16T13:13:16.112-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>Defend Your Code with Top Ten Security Tips Every Developer Must Know</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 134px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2UyEvxYm17_4HqGrx08nTp3BC6qiVE2kiP1wQhkzFKmwuOjBPsgHbHyurUWwygqykMBd0fYXgAXiYJe_ntoL31BoMrUjW7xOWdD4z97CimXuI5R9-sIUt0tdrRhZVIKYphwSnklEuh9U/s200/msndsnp1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5144674871466432546&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;br /&gt;MSDN Magazine, September 2002&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a title=&quot;More articles by this author&quot; href=&quot;http://blogs.msdn.com/michael_howard/&quot;&gt;Michael Howard&lt;/a&gt;&lt;a href=&quot;http://blogs.msdn.com/michael_howard/&quot;&gt; &lt;/a&gt; and&lt;a href=&quot;http://www.pluralsight.com/blogs/keith/default.aspx&quot;&gt; Keith Brown&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Content&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S1&quot;&gt;1. Trust User Input at Your Own Peril&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S2&quot;&gt;2. Protect Against Buffer Overruns&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S3&quot;&gt;3. Prevent Cross-site Scripting&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S4&quot;&gt;4. Don&#39;t Require sa Permissions&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S5&quot;&gt;5. Watch that Crypto Code!&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S6&quot;&gt;6. Reduce Your Attack Profile&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S7&quot;&gt;7. Employ the Principle of Least Privilege&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S8&quot;&gt;8. Pay Attention to Failure Modes&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S9&quot;&gt;9. Impersonation is Fragile&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a target=&quot;_self&quot; href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx#S10&quot;&gt;10. Write Apps that Non-admins Can Actually Use&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;a href=&quot;http://msdn.microsoft.com/msdnmag/issues/02/09/securitytips/default.aspx&quot;&gt;English&lt;/a&gt;&lt;select name=&quot;loc&quot; id=&quot;loc&quot; onchange=&quot;&quot;&gt; &lt;option value=&quot;default.aspx?loc=en&quot;&gt;English&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=de&quot;&gt;Deutsch&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=es&quot;&gt;Español&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=fr&quot;&gt;Français&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=it&quot;&gt;Italiano&lt;/option&gt; &lt;option selected=&quot;selected&quot; value=&quot;default.aspx?loc=jp&quot;&gt;日本語  &lt;/option&gt; &lt;option value=&quot;default.aspx?loc=ko&quot;&gt;한국어&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=pt&quot;&gt;Português&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=ru&quot;&gt;Pусский&lt;/option&gt; &lt;option value=&quot;default.aspx?loc=zh&quot;&gt;简体中文&lt;/option&gt;&lt;option value=&quot;default.aspx?loc=zx&quot;&gt;繁體中文&lt;/option&gt;&lt;/select&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/3983957045797458033/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/3983957045797458033' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3983957045797458033'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3983957045797458033'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/defend-your-code-with-top-ten-security.html' title='Defend Your Code with Top Ten Security Tips Every Developer Must Know'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2UyEvxYm17_4HqGrx08nTp3BC6qiVE2kiP1wQhkzFKmwuOjBPsgHbHyurUWwygqykMBd0fYXgAXiYJe_ntoL31BoMrUjW7xOWdD4z97CimXuI5R9-sIUt0tdrRhZVIKYphwSnklEuh9U/s72-c/msndsnp1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-4818325179594468333</id><published>2007-12-14T21:36:00.000-08:00</published><updated>2007-12-15T08:49:31.619-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Coding"/><title type='text'>CERT Secure Coding Projects</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.blogger.com/www.cert.org&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 47px; height: 34px;&quot; src=&quot;http://www.cert.org/cert/images/cert_logo.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://www.cert.org/secure-coding/&quot;&gt;http://www.cert.org/secure-coding/&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/b&gt;&lt;a href=&quot;http://www.securecoding.cert.org/&quot;&gt;                                                                             CERT Secure Coding Standards&lt;/a&gt;&lt;br /&gt;A collaborative site that provides rules and recommendations for secure coding practices in the C and C++ programming languages&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.cert.org/secure-coding/managedstring.html&quot;&gt;Managed string library&lt;/a&gt;&lt;br /&gt;The managed string library provides a more secure alternative to standard null-terminated byte strings in C. Managed string functions dynamically allocate memory as required, eliminating the possibility of buffer overflows, string truncation, and other common programming errors.&lt;br /&gt;&lt;br /&gt;Secure integer library&lt;br /&gt;This library includes functions for safe integer conversions and arithmetic operations.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.cert.org/search_pubs/search.php&quot;&gt;Publications&lt;/a&gt; &lt;a href=&quot;http://www.cert.org/vodcast/secure-coding/cert_vodcast.rss&quot;&gt;Podcast RSS&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/4818325179594468333/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/4818325179594468333' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4818325179594468333'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4818325179594468333'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/cert-secure-coding-projects.html' title='CERT Secure Coding Projects'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-3015283476264168026</id><published>2007-12-14T19:10:00.000-08:00</published><updated>2007-12-14T19:22:16.739-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="bounded mdoel checking"/><title type='text'>Automatic Discovery of API-Level Exploits</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Not very interesting besides the title and abstract. It could be included it in the &quot;everything ever written about format strings vulnerabilities&quot; section.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRO5zttYD4NocHiTYCO9-iCLO_EXvyopKpnEJfAu4hrqZkCaTZ-OhX-fIrZ2AqpcXSu6rvPrk7EtUBaftFqS5za4IWPe1QH1I97bZmpXWEvinPEbK-tzRGHw7vVcIwfQGRwH9jU7XuoJY/s1600-h/pdf_icon.gif&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRO5zttYD4NocHiTYCO9-iCLO_EXvyopKpnEJfAu4hrqZkCaTZ-OhX-fIrZ2AqpcXSu6rvPrk7EtUBaftFqS5za4IWPe1QH1I97bZmpXWEvinPEbK-tzRGHw7vVcIwfQGRwH9jU7XuoJY/s200/pdf_icon.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5144034594921814034&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;sectionHeaders&quot;&gt;&lt;a href=&quot;http://www.cs.wisc.edu/wpis/papers/icse05.pdf&quot;&gt; PDF&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;By Vinod Ganapathy, Sanjit A. Seshia,  Somesh Jha, Thomas W. Reps, Randal E. Bryant &lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;sectionHeaders&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Abstract&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;We argue that &lt;span style=&quot;font-weight: bold;&quot;&gt;finding vulnerabilities in software components is different from finding exploits&lt;/span&gt; against them. Exploits that compromise security often use several low-level details of the component, such as layouts of stack frames. Existing software analysis tools, while effective at identifying vulnerabilities, fail to model low-level details, and are hence unsuitable for exploit-finding. &lt;span style=&quot;font-size:85%;&quot;&gt;We study the issues involved in exploit-finding by considering application programming interface (API) level exploits. A software component is vulnerable to an API-level exploit if its security can be compromised by invoking a sequence of API operations allowed by the component. We present a framework to model low-level details of APIs, and develop an automatic technique based on &lt;span style=&quot;font-weight: bold;&quot;&gt;bounded, infinite-state model checking&lt;/span&gt; to discover API-level exploits. We present two instantiations of this framework. &lt;span style=&quot;font-size:78%;&quot;&gt;We show&lt;span style=&quot;font-weight: bold;&quot;&gt; that format-string exploits can be modeled as API-level exploits&lt;/span&gt;, and demonstrate our technique by finding exploits against vulnerabilities in widely-used software. We also use the framework to model a cryptographic-key management API (the IBM CCA) and demonstrate a tool that identifies a &lt;span style=&quot;font-weight: bold;&quot;&gt;previously known exploit.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/3015283476264168026/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/3015283476264168026' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3015283476264168026'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/3015283476264168026'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/automatic-discovery-of-api-level.html' title='Automatic Discovery of API-Level Exploits'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRO5zttYD4NocHiTYCO9-iCLO_EXvyopKpnEJfAu4hrqZkCaTZ-OhX-fIrZ2AqpcXSu6rvPrk7EtUBaftFqS5za4IWPe1QH1I97bZmpXWEvinPEbK-tzRGHw7vVcIwfQGRwH9jU7XuoJY/s72-c/pdf_icon.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-7376761102591459011</id><published>2007-12-14T18:41:00.000-08:00</published><updated>2007-12-16T13:40:48.666-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type='text'>Blended Attacks: Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://peterszor.com/blended.pdf&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 37px; height: 34px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRO5zttYD4NocHiTYCO9-iCLO_EXvyopKpnEJfAu4hrqZkCaTZ-OhX-fIrZ2AqpcXSu6rvPrk7EtUBaftFqS5za4IWPe1QH1I97bZmpXWEvinPEbK-tzRGHw7vVcIwfQGRwH9jU7XuoJY/s200/pdf_icon.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Blended Attacks: Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;by &lt;a href=&quot;http://peterszor.com/&quot;&gt;Peter Szor&lt;/a&gt; and &lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Eric Chien &lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;/ &lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Virus Bulletin Conference September 2002&lt;a href=&quot;http://peterszor.com/&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;a href=&quot;http://peterszor.com/blended.pdf&quot;&gt;PDF&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;Peter Szor is the author of the excellent &lt;a href=&quot;http://www.amazon.com/badcoded/dp/0321304543&quot;&gt;T&lt;/a&gt;&lt;a href=&quot;http://www.amazon.com/badcoded/dp/0321304543&quot;&gt;&lt;span class=&quot;text&quot;&gt;&lt;i&gt;&lt;span style=&quot;line-height: 17px;&quot;&gt;he Art of Computer  Virus Research and Defense.&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/7376761102591459011/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/7376761102591459011' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7376761102591459011'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7376761102591459011'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/blended-attacks-exploits.html' title='Blended Attacks: Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRO5zttYD4NocHiTYCO9-iCLO_EXvyopKpnEJfAu4hrqZkCaTZ-OhX-fIrZ2AqpcXSu6rvPrk7EtUBaftFqS5za4IWPe1QH1I97bZmpXWEvinPEbK-tzRGHw7vVcIwfQGRwH9jU7XuoJY/s72-c/pdf_icon.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-6095805679862773935</id><published>2007-12-13T17:16:00.000-08:00</published><updated>2007-12-13T17:18:06.482-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="webbrowser"/><title type='text'>The Script Mapping Project</title><content type='html'>The purpose of the WASC Script Mapping Project is to come up with an exhaustive list of vectors to execute script within a web page without the use of [script] tags. This data can be useful when testing poorly implemented Cross-site Scripting blacklist filters, for those wishing to build an html white list system, as well as other uses.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.webappsec.org/projects/scriptmapping/&quot;&gt;The Script Mapping Project&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/6095805679862773935/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/6095805679862773935' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/6095805679862773935'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/6095805679862773935'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/script-mapping-project.html' title='The Script Mapping Project'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-7902159407143713121</id><published>2007-12-13T16:01:00.000-08:00</published><updated>2007-12-13T16:04:40.533-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="hitb2005"/><category scheme="http://www.blogger.com/atom/ns#" term="video"/><title type='text'>Hacking Windows CE</title><content type='html'>&lt;span style=&quot;font-size: 85%;&quot;&gt;&lt;a href=&quot;http://www.hackinthebox.org/&quot;&gt;HITBSecConf2005  &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;talk by San&lt;br /&gt;&lt;embed style=&quot;width:400px; height:326px;&quot; id=&quot;VideoPlayback&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://video.google.com/googleplayer.swf?docId=-5267604854780005543&amp;hl=en&quot; flashvars=&quot;&quot;&gt; &lt;/embed&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/7902159407143713121/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/7902159407143713121' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7902159407143713121'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/7902159407143713121'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/hacking-windows-ce.html' title='Hacking Windows CE'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-4614916306372688875</id><published>2007-12-13T15:54:00.000-08:00</published><updated>2007-12-13T15:59:48.199-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="hitb2005"/><category scheme="http://www.blogger.com/atom/ns#" term="video"/><title type='text'>Analyzing Code for Security Defects</title><content type='html'>&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.hackinthebox.org/&quot;&gt;HITBSecConf2005  &lt;/a&gt;&lt;/span&gt;&lt;span&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;talk by Nish Bhalla&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;embed style=&quot;width: 400px; height: 326px;&quot; id=&quot;VideoPlayback&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://video.google.com/googleplayer.swf?docId=-2896121880099510936&amp;amp;hl=en&quot; flashvars=&quot;&quot;&gt;&lt;/embed&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/4614916306372688875/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/4614916306372688875' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4614916306372688875'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/4614916306372688875'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/analyzing-code-for-security-defects.html' title='Analyzing Code for Security Defects'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5798071228088816152.post-330486658100531870</id><published>2007-12-13T15:27:00.000-08:00</published><updated>2007-12-14T21:34:13.090-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="badcoded"/><category scheme="http://www.blogger.com/atom/ns#" term="java"/><category scheme="http://www.blogger.com/atom/ns#" term="video"/><title type='text'>Java 2 Micro Edition (J2ME) Security Vulnerabilities</title><content type='html'>&lt;div style=&quot;text-align: right;&quot;&gt;&lt;span style=&quot;color: rgb(153, 255, 255);&quot;&gt;badcoded is web 2.0?&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.hackinthebox.org/&quot;&gt;HITBSecConf2004&lt;/a&gt;&lt;br /&gt;talk by Adam Gowdiak&lt;br /&gt;&lt;embed style=&quot;width: 400px; height: 326px;&quot; id=&quot;VideoPlayback&quot; type=&quot;application/x-shockwave-flash&quot; src=&quot;http://video.google.com/googleplayer.swf?docId=-4221350016159075663&amp;amp;hl=en&quot; flashvars=&quot;&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;Once upon a time badcoded was about ASCII text files.&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://badcoded.blogspot.com/feeds/330486658100531870/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5798071228088816152/330486658100531870' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/330486658100531870'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5798071228088816152/posts/default/330486658100531870'/><link rel='alternate' type='text/html' href='http://badcoded.blogspot.com/2007/12/java-2-micro-edition-j2me-security.html' title='Java 2 Micro Edition (J2ME) Security Vulnerabilities'/><author><name>them</name><uri>http://www.blogger.com/profile/03704391947266343697</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>