In this tutorial, we expand on our previous article on AFL by developping a simple exploit using PEDA and Pwntools.
I am an avid user of binwalk since it automates the initial reverse engineering work. It identifies the compression if any, and file format of a given firmware fairly easily once you take care of the false positives. Last week I built a virtual machine (VM) using a minimal install of Xubuntu Linux. My last […]
A press release from BAE Systems announced the installation of the Submarine Command System Next Generation (SMCS NG) on twelve nuclear submarines of the Royal Navy, effectively ending the conversion of the seven Trafalgar-class submarines, four Vanguard-class submarines and one Swiftsure class. The new command system is based on COTS hardware and software products. It […]
Two days ago, the Inquirer post an article on a new law passed in the Chinese city of Nanchang, in the Jiangxi province, to replace pirated copies of Windows in Internet cafes by legitimate software. The alternative proposed to the cafes is the Red Flag Linux distribution, which prompted fears of snooping by U.S Radio […]
The Integrity Operating System, an OS with the highest security rating from the National Security Agency (NSA) and used by the military, will now be sold to the private sector by Integrity Global Security, a subsidiary of Green Hills Software. The commercial operating system will be based on the Integrity 178-B OS, which was used […]