<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2541885528459487831</id><updated>2024-09-01T18:35:10.940-03:00</updated><category term="code"/><category term="hacking"/><category term="linux"/><category term="assembly"/><category term="c"/><category term="shellcode"/><category term="reverse engineering"/><category term="slae"/><category term="elf"/><category term="crackme"/><category term="cryptography"/><category term="python"/><category term="bitcoin"/><category term="cryptocoin"/><category term="dogecoin"/><category term="elisp"/><category term="emacs"/><category term="litecoin"/><category term="metasploit"/><category term="mining"/><category term="pci-e"/><category term="rig"/><category term="riser"/><category term="bash"/><category term="cable"/><category term="command line"/><category term="dot files"/><category term="gpu"/><category term="hacker"/><category term="kernel"/><category term="mineração"/><category term="osdev"/><category term="xorg"/><title type='text'>Hacking bits</title><subtitle type='html'>0101011101101000011110010010000001101110011011110111010000111111</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>28</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-4160537858576999069</id><published>2015-10-23T12:24:00.000-03:00</published><updated>2015-10-23T12:24:09.761-03:00</updated><title type='text'>New site</title><summary type="text">We moved to a new home.

http://hackingbits.github.io/

See you there.</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/4160537858576999069/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2015/10/new-site.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4160537858576999069'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4160537858576999069'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2015/10/new-site.html' title='New site'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-3303590453568159596</id><published>2015-05-18T16:42:00.002-03:00</published><updated>2015-05-19T21:57:31.801-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bash"/><category scheme="http://www.blogger.com/atom/ns#" term="command line"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="xorg"/><title type='text'>How to find out the current (in use) XServer DISPLAY number!</title><summary type="text">
Well, just the hack of the day.



$ ps u | awk -v tty=$(cat /sys/class/tty/tty0/active) &#39;$0 ~ tty { print $2&amp;nbsp; }&#39; | while read pid &amp;amp;&amp;amp; [[ &quot;$display&quot; == &quot;&quot; ]]; do&amp;nbsp; display=&quot;$(awk -v RS=&#39;\0&#39; -F= &#39;$1==&quot;DISPLAY&quot; { print $2 }&#39; /proc/$pid/environ)&quot;; if [ &quot;$display&quot; != &quot;&quot; ]; then echo &quot;$display&quot;; fi; done 2&amp;gt;/dev/null

:0 



Can you improve it? So tell me how. o/

The discussion </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/3303590453568159596/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2015/05/how-do-i-find-out-current-in-use.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3303590453568159596'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3303590453568159596'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2015/05/how-do-i-find-out-current-in-use.html' title='How to find out the current (in use) XServer DISPLAY number!'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-7782021131789561376</id><published>2014-09-18T11:23:00.000-03:00</published><updated>2014-09-18T11:32:35.361-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>A book to study C, or NOT!</title><summary type="text">
As promised I&#39;m back to talk about the Programming in C (4th Edition) book. Well, I&#39;ll paste my amazon&#39;s review, to be short.



&quot;When I started this reading soon I became absorbed by the formation of the writer&#39;s words. Unfortunately that feeling did not persist throughout the work. I still read until functions chapter, but the book is not renewed in style. There&#39;s much prolonged talk for bit </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/7782021131789561376/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/09/a-book-to-study-c-or-not.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/7782021131789561376'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/7782021131789561376'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/09/a-book-to-study-c-or-not.html' title='A book to study C, or NOT!'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-6071682935108920742</id><published>2014-08-26T20:17:00.000-03:00</published><updated>2014-08-26T20:24:40.439-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><title type='text'>A book to study C</title><summary type="text">
I received my copy of Programming in C (4th Edition) (Developer&#39;s Library) from Pearson today.





The book is dense with 548 pages and, at first glance, a great resource for beginners and advanced C coders. I&#39;ll let you know more about my reading. Just wait.
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/6071682935108920742/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/08/a-book-to-study.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6071682935108920742'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6071682935108920742'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/08/a-book-to-study.html' title='A book to study C'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-5615588454119461090</id><published>2014-08-15T12:20:00.000-03:00</published><updated>2014-08-15T12:21:07.015-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><title type='text'>Odd ways to zeroing some x86_64 registers</title><summary type="text">
Hi there! Here are some ways (retrocompatible instructions [1-2] and xmm) to fill registers with zero (NULL) bytes without have any zero bytes in bytecode.




400091: &amp;nbsp; &amp;nbsp;6a 01 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;pushq &amp;nbsp;$0x1
400093: &amp;nbsp; &amp;nbsp;58 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; pop &amp;nbsp; &amp;nbsp;%rax
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/5615588454119461090/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/08/odd-ways-to-zeroing-some-x8664-registers.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/5615588454119461090'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/5615588454119461090'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/08/odd-ways-to-zeroing-some-x8664-registers.html' title='Odd ways to zeroing some x86_64 registers'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-3284954237578817850</id><published>2014-07-25T09:53:00.000-03:00</published><updated>2014-07-25T09:53:38.724-03:00</updated><title type='text'>Você Fiscal!!! Eleições...</title><summary type="text">
Temos a oportunidade de sermos fiscais de verdade nas próximas eleições. Para isso, o mínimo que podemos fazer, neste momento, é contribuir com o Projeto Você Fiscal&amp;nbsp;(Diego Aranha) e divulgá-lo o máximo possível.



http://www.catarse.me/pt/VoceFiscal



Eu, no momento, não acredito na discussão política atual; antes, ao meu ver, teríamos que discutir o homem em si, para só depois </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/3284954237578817850/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/07/voce-fiscal-eleicoes.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3284954237578817850'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3284954237578817850'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/07/voce-fiscal-eleicoes.html' title='Você Fiscal!!! Eleições...'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1068899370638288215</id><published>2014-05-26T08:19:00.002-03:00</published><updated>2014-05-26T08:25:03.514-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="elisp"/><category scheme="http://www.blogger.com/atom/ns#" term="emacs"/><title type='text'>Uzumaki.el - a simple Emacs buffers cycler</title><summary type="text">
I always complained about the buffer switching procedures in Emacs. So I decided to create my own method to do that, and it rocks (to me ;D ).



Check it: https://github.com/geyslan/uzumaki/



And it&#39;s also available through MELPA archive:&amp;nbsp;http://melpa.milkbox.net/#/uzumaki



If you do like it, or don&#39;t, feel free to do pull requests on git.
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1068899370638288215/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/05/uzumakiel-simple-emacs-buffers-cycler.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1068899370638288215'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1068899370638288215'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/05/uzumakiel-simple-emacs-buffers-cycler.html' title='Uzumaki.el - a simple Emacs buffers cycler'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1737752253034423384</id><published>2014-04-28T17:22:00.000-03:00</published><updated>2014-04-28T17:39:45.661-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="dot files"/><category scheme="http://www.blogger.com/atom/ns#" term="elisp"/><category scheme="http://www.blogger.com/atom/ns#" term="emacs"/><category scheme="http://www.blogger.com/atom/ns#" term="kernel"/><category scheme="http://www.blogger.com/atom/ns#" term="osdev"/><title type='text'>Returning Slowly - config (dot) files and kernel study</title><summary type="text">
Hello all! しばらくですね。



After a long time I came back to studies and, before that, I improved my config files to make the coding easier.



Emacs is rocking to my needs, check it: https://github.com/geyslan/configs/blob/master/home/.emacs.d/init.el



And why not to study (slowly) about OSDev (kernel)? So: https://github.com/radix-kernel/radix



See you.
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1737752253034423384/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/04/returning-slowly-config-dot-files-and.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1737752253034423384'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1737752253034423384'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/04/returning-slowly-config-dot-files-and.html' title='Returning Slowly - config (dot) files and kernel study'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-4004796078508145637</id><published>2014-02-06T09:28:00.001-03:00</published><updated>2014-02-07T13:56:24.097-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptocoin"/><category scheme="http://www.blogger.com/atom/ns#" term="dogecoin"/><category scheme="http://www.blogger.com/atom/ns#" term="litecoin"/><category scheme="http://www.blogger.com/atom/ns#" term="mining"/><category scheme="http://www.blogger.com/atom/ns#" term="pci-e"/><category scheme="http://www.blogger.com/atom/ns#" term="rig"/><category scheme="http://www.blogger.com/atom/ns#" term="riser"/><title type='text'>Moedas Criptográficas: Elétrons como Força de Trabalho</title><summary type="text">
MOEDAS
CRIPTOGRÁFICAS:

ELÉTRONS COMO
FORÇA DE TRABALHO







BEM, Geyslan
Gregório







RESUMO

Breve explanação
do conceito moeda criptográfica e sua implicação na mudança de
paradigma da atribuição de valor e prova de trabalho comumente
aceitos. Tece sobre visões econômicas e o uso do modelo da demanda
e oferta nesse commodity.
Expõe métodos de obtenção e comercialização de moedas e
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/4004796078508145637/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/02/moedas-criptograficas-eletrons-como.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4004796078508145637'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4004796078508145637'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/02/moedas-criptograficas-eletrons-como.html' title='Moedas Criptográficas: Elétrons como Força de Trabalho'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh6.googleusercontent.com/ozrqlGYZJSVU0rBtTS-mPpesbkbePcyGiGeP-fB0oJp_2HNHIwbWZuQfhKOiJL6yFbTQM5sNFErhSle92RbSNo6RDmXSPOJPwgZNdOICrgo1n2ugU075xzs0LA=s72-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-4556245833953019831</id><published>2014-02-06T08:48:00.000-03:00</published><updated>2014-05-21T21:49:08.669-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="cable"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptocoin"/><category scheme="http://www.blogger.com/atom/ns#" term="dogecoin"/><category scheme="http://www.blogger.com/atom/ns#" term="gpu"/><category scheme="http://www.blogger.com/atom/ns#" term="litecoin"/><category scheme="http://www.blogger.com/atom/ns#" term="mineração"/><category scheme="http://www.blogger.com/atom/ns#" term="mining"/><category scheme="http://www.blogger.com/atom/ns#" term="pci-e"/><category scheme="http://www.blogger.com/atom/ns#" term="rig"/><category scheme="http://www.blogger.com/atom/ns#" term="riser"/><title type='text'>Mining cryptocoins (Minerando moedas criptográficas) - Será?</title><summary type="text">
E o Brasil acordou para as moedas criptográficas. A demanda interna por produtos para confecção de rigs está grande (riser cables, rig frames, rigs completos).









Aproveitando esse despertar, estamos ofertando os produtos e serviços relacionados:

GPU R9 290 4GB 512bit

http://produto.mercadolivre.com.br/MLB-537705662-gpu-rig-mineraco-radeon-r9-290-4gb-512bit-bitcoin-litecoin-_JM




Cabo </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/4556245833953019831/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/02/mining-cryptocoins-minerando-moedas.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4556245833953019831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4556245833953019831'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/02/mining-cryptocoins-minerando-moedas.html' title='Mining cryptocoins (Minerando moedas criptográficas) - Será?'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-6801982322604441068</id><published>2014-01-07T12:53:00.000-03:00</published><updated>2014-01-07T13:48:21.154-03:00</updated><title type='text'>[AnchisesLandia] Mais de 500 Profissionais de Segurança no Twitter</title><summary type="text">
Compartilho com vocês uma bela lista, elaborada pelo colega Anchises, com os profissionais e afins da área de Segurança (estende-se a várias especialidades). E aproveito para agradecer a esse grande hacker pela inclusão de meu nome (fato que só percebi hoje - /o\ shame), mesmo eu sendo apenas um curioso a respeito de computadores. :-)


Mais de 500 Profissionais de Segurança no Twitter

http://</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/6801982322604441068/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2014/01/anchiseslandia-mais-de-500.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6801982322604441068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6801982322604441068'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2014/01/anchiseslandia-mais-de-500.html' title='[AnchisesLandia] Mais de 500 Profissionais de Segurança no Twitter'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-4070258278905995072</id><published>2013-10-28T14:53:00.001-03:00</published><updated>2013-10-28T14:57:10.545-03:00</updated><title type='text'>&quot;It works&quot; mantra</title><summary type="text">
Hi there,



I would like to share with you this Coverity post&amp;nbsp;(Andy) that, somehow, I have instigated through discussion in lkml. Andy&#39;s argument corroborates with mine, which concerns the deceptive &quot;it works&quot; mantra.



Code isn&#39;t only a piece that makes things happen. It&#39;s really a piece of art that demands clarity for whomever read it.



o/
</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/4070258278905995072/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/10/it-works-mantra.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4070258278905995072'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4070258278905995072'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/10/it-works-mantra.html' title='&quot;It works&quot; mantra'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-4203435448292129696</id><published>2013-06-07T10:21:00.000-03:00</published><updated>2013-06-07T10:48:02.243-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="elf"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><title type='text'>(Un)building Software - English Version</title><summary type="text">




“Reverse engineering is the process of extracting the knowledge or design blueprints from anything man-made. Software is one of the most complex and intriguing technologies around us nowadays, and software reverse engineering is about opening up a program’s &#39;box&#39; and looking inside. Of course, we won’t need any screwdrivers on this journey. Just like software engineering, software reverse </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/4203435448292129696/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/06/unbuilding-software-english-version.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4203435448292129696'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/4203435448292129696'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/06/unbuilding-software-english-version.html' title='(Un)building Software - English Version'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/15523225130266378472</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1470897708681582133</id><published>2013-06-06T22:04:00.001-03:00</published><updated>2013-09-03T11:17:23.043-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="elf"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><title type='text'>(Des)construindo Software - Parte 2</title><summary type="text">
Ao finalizar o primeiro post, disse-lhes que neste iniciaríamos uma abordagem prática da engenharia reversa que possibilitaria um entendimento objetivo da estrutura ELF. Contudo, optei por inverter essa ordem, sendo que agora daremos início diretamente pelo ELF, a despeito de que a análise da sua estrutura, mesmo que realizada minimamente, em si já é um meio de reversão, e, somente empós, </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1470897708681582133/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/06/desconstruindo-software-parte-2.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1470897708681582133'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1470897708681582133'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/06/desconstruindo-software-parte-2.html' title='(Des)construindo Software - Parte 2'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-8457197090012722511</id><published>2013-05-06T20:00:00.000-03:00</published><updated>2013-08-20T15:38:59.767-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="crackme"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="elf"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="python"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><title type='text'>Crackme 03 - Source Code</title><summary type="text">
E não demorou quase nada!



Parabéns ao Fernando Mercês e ao Andrey Arapov que quebraram rapidinho o binário utilizando formas distintas e super interessantes.



Este é o walk through&amp;nbsp;(análise dinâmica) do Andrey.

http://www.nixaid.com/reverse_engineering/crackme_v3_walkthrough



Abaixo o do Fernando Mercês (análise estática).

https://groups.google.com/d/msg/brasil-underground/</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/8457197090012722511/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/05/crackme-03-source-code.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/8457197090012722511'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/8457197090012722511'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/05/crackme-03-source-code.html' title='Crackme 03 - Source Code'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-7462187792331408055</id><published>2013-05-05T00:10:00.001-03:00</published><updated>2013-06-06T22:41:04.961-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="crackme"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="elf"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><title type='text'>Crackme 03</title><summary type="text">
Olá!



Como&amp;nbsp;outrora&amp;nbsp;prometido, disponibilizo-lhes o novo crackme (crackme.03.32 - Linux/x86).



Esta versão segue uma abordagem diferente das anteriores, pois não há input a ser descoberto. ;D



Vocês podem fazer o&amp;nbsp;download&amp;nbsp;do binário diretamente do git.



O código fonte (assembly) será disponibilizado logo após o primeiro aventureiro me informar como conseguiu quebrá-lo.</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/7462187792331408055/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/05/crackme-03.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/7462187792331408055'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/7462187792331408055'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/05/crackme-03.html' title='Crackme 03'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-2083288330686489851</id><published>2013-04-29T12:03:00.000-03:00</published><updated>2013-08-22T13:17:25.039-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="python"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 7th Assignment - Crypted Shellcodes</title><summary type="text">/*
&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:
&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP
&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port
&amp;nbsp; &amp;nbsp;SLAE - 2nd Assignment - Shell Reverse TCP
&amp;nbsp; &amp;nbsp;O menor do mundo? Yeah? So Beat the Bits!&amp;nbsp;&amp;nbsp;
&amp;nbsp; &amp;nbsp;SLAE - 3rd Assignment - Caçando Ovos?
&amp;nbsp; &amp;nbsp;SLAE - 4th Assignment - </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/2083288330686489851/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-7th-assignment-crypted-shellcodes.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/2083288330686489851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/2083288330686489851'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-7th-assignment-crypted-shellcodes.html' title='SLAE - 7th Assignment - Crypted Shellcodes'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1360412718652150375</id><published>2013-04-21T19:33:00.001-03:00</published><updated>2013-08-22T17:24:25.700-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 6th Assignment - Polymorphic Shellcodes</title><summary type="text">/*
&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:
&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP
&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port
&amp;nbsp; &amp;nbsp;SLAE - 2nd Assignment - Shell Reverse TCP
&amp;nbsp; &amp;nbsp;O menor do mundo? Yeah? So Beat the Bits!&amp;nbsp;&amp;nbsp;
&amp;nbsp; &amp;nbsp;SLAE - 3rd Assignment - Caçando Ovos?
&amp;nbsp; &amp;nbsp;SLAE - 4th Assignment - </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1360412718652150375/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-6th-assignment-polymorphic.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1360412718652150375'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1360412718652150375'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-6th-assignment-polymorphic.html' title='SLAE - 6th Assignment - Polymorphic Shellcodes'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-6393881731251896975</id><published>2013-04-20T15:56:00.003-03:00</published><updated>2013-08-22T11:41:03.312-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 5th Assignment - Metasploit Shellcodes Analysis</title><summary type="text">/*
&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:
&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP
&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port
&amp;nbsp; &amp;nbsp;SLAE - 2nd Assignment - Shell Reverse TCP
&amp;nbsp; &amp;nbsp;O menor do mundo? Yeah? So Beat the Bits!&amp;nbsp;&amp;nbsp;
&amp;nbsp; &amp;nbsp;SLAE - 3rd Assignment - Caçando Ovos?
&amp;nbsp; &amp;nbsp;SLAE - 4th Assignment - </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/6393881731251896975/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-5th-assignment-metasploit.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6393881731251896975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6393881731251896975'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-5th-assignment-metasploit.html' title='SLAE - 5th Assignment - Metasploit Shellcodes Analysis'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-937447178869282231</id><published>2013-04-12T23:30:00.001-03:00</published><updated>2013-08-20T15:41:02.420-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="python"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 4th Assignment - Encoding and Decoding Gollums</title><summary type="text">/*
&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:
&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP
&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port
&amp;nbsp; &amp;nbsp;SLAE - 2nd Assignment - Shell Reverse TCP
&amp;nbsp; &amp;nbsp;O menor do mundo? Yeah? So Beat the Bits! &amp;nbsp;
&amp;nbsp; &amp;nbsp;SLAE - 3rd Assignment - Caçando Ovos?
*/


This blog post has been created for </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/937447178869282231/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-4th-assignment-encoding-and.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/937447178869282231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/937447178869282231'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/slae-4th-assignment-encoding-and.html' title='SLAE - 4th Assignment - Encoding and Decoding Gollums'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-6436194279625502444</id><published>2013-04-07T12:26:00.000-03:00</published><updated>2013-08-20T15:37:34.940-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="crackme"/><category scheme="http://www.blogger.com/atom/ns#" term="elf"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>Crack them all!</title><summary type="text">Olá pessoal!


Recentemente, por conta do curso SLAE, conheci o Andrey Arapov; russo gente fina!&amp;nbsp;Em um de nossos talks enviei-lhe um crackme que tinha preparado para o Cogumelo Binário. Não deu outra, o cara só descansou quando conseguiu descobrir a senha!



Mas não paramos por aí! Após analisar o walkthrough dele, compilei uma nova versão com alguns tricks adicionais.



Deu no mesmo! (LOL</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/6436194279625502444/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/crack-them-all.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6436194279625502444'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/6436194279625502444'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/04/crack-them-all.html' title='Crack them all!'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-2827188970984295225</id><published>2013-03-27T12:07:00.001-03:00</published><updated>2013-06-06T22:43:20.144-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 3rd Assignment - Caçando Ovos?</title><summary type="text">
/*

&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:

&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP

&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port

&amp;nbsp; &amp;nbsp;SLAE - 2nd Assignment - Shell Reverse TCP

&amp;nbsp; &amp;nbsp;O menor do mundo? Yeah? So Beat the Bits!&amp;nbsp;&amp;nbsp;

*/




This blog post has been created for completing the requirements of the </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/2827188970984295225/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/slae-3rd-assignment-cacando-ovos.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/2827188970984295225'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/2827188970984295225'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/slae-3rd-assignment-cacando-ovos.html' title='SLAE - 3rd Assignment - Caçando Ovos?'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijHwt5gE4TcJh6cD8sAEr1O7Os6QqUBCOM7Rei3AzPStoDB4oYCHfVoTIY69BbjEHzdOEkIDneCUKNXEF9LEK-JGU-MOtxytLbxW5bXdCCGPmCE-6TlDrryGGCD5J50Eu6LoWyYLs-Oa3e/s72-c/Aptitude_moo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-3414477427392965127</id><published>2013-03-25T08:35:00.000-03:00</published><updated>2013-08-20T15:24:46.146-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><title type='text'>O menor do mundo? Yeah? So Beat the Bits!</title><summary type="text">
/*
Off-Topic: Está disponível no Shell-Storm versão do Shell Bind TCP usando o método GetPC (GetEIP).&amp;nbsp;Os demais shellcodes apresentados neste post também já foram disponibilizados no mesmo repositório.&amp;nbsp;Tks again, Salwan.
*/

Enquanto que em muita área por aí o que importa é ter ou fazer algo grande, quando falamos em shellcodes sempre os queremos minúsculos, correto? E mesmo que isso </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/3414477427392965127/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/o-menor-do-mundo-yeah-so-beat-bits.html#comment-form' title='1 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3414477427392965127'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/3414477427392965127'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/o-menor-do-mundo-yeah-so-beat-bits.html' title='O menor do mundo? Yeah? So Beat the Bits!'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPiDO49O1B3XWCPkayH2bQkzsaabsWEuZZ5nKzMdKM-SgqT7pfvmehUR-pZgET-_CmKc_rE6iiqcfO3YlVqDgZ3T84Gi19pLXXNfpcS2ROWx2Rhjb6hlgJLOen7pIxbB5fore1RRgIhNIC/s72-c/Registers.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1069667985052517024</id><published>2013-03-20T00:40:00.000-03:00</published><updated>2013-06-06T22:44:21.128-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="reverse engineering"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>SLAE - 2nd Assignment - Shell Reverse TCP</title><summary type="text">

/*

&amp;nbsp; &amp;nbsp;Este post é uma sequência. Para melhor entendimento, vejam:

&amp;nbsp; &amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP&amp;nbsp;

&amp;nbsp; &amp;nbsp;Hacking do Dia - Shell Bind TCP Random Port

*/


This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification:


http://securitytube-training.com/online-courses/</summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1069667985052517024/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/slae-2nd-assignment-shell-reverse-tcp.html#comment-form' title='2 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1069667985052517024'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1069667985052517024'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/slae-2nd-assignment-shell-reverse-tcp.html' title='SLAE - 2nd Assignment - Shell Reverse TCP'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2541885528459487831.post-1583820687648973523</id><published>2013-03-18T23:00:00.000-03:00</published><updated>2014-05-04T11:38:14.382-03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="assembly"/><category scheme="http://www.blogger.com/atom/ns#" term="c"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="shellcode"/><category scheme="http://www.blogger.com/atom/ns#" term="slae"/><title type='text'>Hacking do Dia - Shell Bind TCP Random Port</title><summary type="text">


/*
&amp;nbsp; &amp;nbsp;Para melhor entendimento, leiam o post anterior&amp;nbsp;SLAE - 1st Assignment - Shell Bind TCP
*/




&amp;lt;UPDATE&amp;gt;

&amp;nbsp; &amp;nbsp;O shellcode final deste post foi aceito&amp;nbsp;no repositório&amp;nbsp;Shell-Storm.
&amp;nbsp; &amp;nbsp;Tks Jonathan Salwan.



&amp;lt;/UPDATE&amp;gt;

&amp;lt;UPDATE 2&amp;gt;

&amp;nbsp;&amp;nbsp; Foram incluídas no Metasploit as versões x86 e x86_64 deste payload.
&amp;nbsp; &amp;nbsp;Tks </summary><link rel='replies' type='application/atom+xml' href='http://hackingthebits.blogspot.com/feeds/1583820687648973523/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/hacking-do-dia-shell-bind-tcp-random.html#comment-form' title='2 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1583820687648973523'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2541885528459487831/posts/default/1583820687648973523'/><link rel='alternate' type='text/html' href='http://hackingthebits.blogspot.com/2013/03/hacking-do-dia-shell-bind-tcp-random.html' title='Hacking do Dia - Shell Bind TCP Random Port'/><author><name>Uzumaki</name><uri>http://www.blogger.com/profile/10691664959745389467</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry></feed>