Author: cyphunk
-
An Illustrated Guide to Cryptographic Hashes Intro.
An Illustrated Guide to Cryptographic Hashes by Steve Friedl 15 pages of text Update 2006.02.11: clearer explanation of CTFP preimage resistance. This is a very good introduction to what a hash algorithm is, what it is for and what collisions are all about. It does not cover specific details, only the general understanding. It’s a…
-
VB Reversed – A decompiling approach
Visual Basic Reversed – A Decompiling Approach by Andrea Geddon 27 pages, 20 of code. Update 2006.02.11: more intuitive structure list and directions of use. This is would have made for a good introduction to reversing Visual Basic if it were not for a few errors. One can still learn a bit about the data…
-
Introduction to FPGA,CPLD,PLD
Programmable Logic: What’s it to Ya? by Michael Barr from Embedded Systems Programming, June 1999 6 pages This document gives a basic overview of common programmable logic hardware: FPGA’s, CPLD’s and PLD. (Hold the mouse over links and acronyms to see their full definition or click to follow to their wikipedia entries). PLD In the…
-
Herding Hash Functions
Herding Hash Functions and the Nostradamus Attack (presentation slides) by John Kelsey and Tadayoshi Kohno 8 pages of text The paper describes an attack that would allow an attacker to massage (“herd”) an object to a point where it matches a hash value chosen by the attacker prior. What appears to be an important restriction…
-
Bugger The Debugger
Bugger The Debugger, Pre Interaction Debugger Code Execution By Brett Moore, CTO Security-Assessment.com. 10 pages of text, 3 of which are code. This paper describes a method to construct a binary which can run code before control is passed to a debugger. The method requires changing the PE header of an executable to reference your…