deadhacker.com

security research repository of nathan andrew fain / cyphunk

  • About
  • Tools
  • Categories
    • Talks
    • Reverse Engineering
    • Tools
    • Cryptography
  • Workflow for hardware security analysis

    My workflow for threat weighted hardware analsysis or research has changed with time. Slight uniformaty has found its way into my routine which is helpful for cross referencing knowledge between projects. With the curse of multitasking projects a constant this also reduces the time required to switch between projects or pickup on an old project. I’d […]

    cyphunk

    November 8, 2009
    Reverse Engineering
  • Targeting the Panasonic HVX200 HD camera

    Update Mar.2010: Deti has found a way modify the image enough to start a “service” menu. See his thread, he explains this and much more (german thread) This is a semi-professional HD video camera that sells for -5000. Regardless if you have this camera or not the methods discussed herein should encourage you to pull […]

    cyphunk

    July 26, 2009
    Reverse Engineering
    Embedded Linux, hvx 200, Reverse Engineering
  • The Subterfugue process sandbox

    These are tools that let one run a process and, in a sense, selectively debug by telling the tool to perform analysis when conditions are met in the kernel, such as when a certain argument is sent to sendto() one could replace it on the stack with their own value. You could write your own […]

    cyphunk

    May 6, 2008
    Reverse Engineering
  • Finding entropy in binary files

    Update: added routine to print out hex data for blocks where entropy passes a given threshold. Update: GUI display of graph (using TK) was not working on my system. Code now saves an image of the results in addition to attempting to display with GUI. Update: These days I use a slightly modified libdisorder and […]

    cyphunk

    May 13, 2007
    Reverse Engineering, Tools
  • Formal aspects of mobile code security – Chapter 5

    Formal aspects of mobile code security – Chapter 5 PhD thesis for Richard Drews Dean 23 page chapter. Incomplete: Need to discuss how the author discovered attacks. Need to check my description using the detailed equations provided. I must illustrate the attack methods. The interest in this thesis is due to its reference in Heard […]

    cyphunk

    February 22, 2006
    Cryptography
  • SHA-1 Illustrated

    By Nathan Fain Incomplete: must create detailed diagram for compression functions. The following simplifies the specification of SHA-1 in an easy to digest form. First we will cover the general structure of the algorithm. Detail of the expansion and compression routines are covered separately. First we start with a message. The message is padded and […]

    cyphunk

    February 21, 2006
    Cryptography
←Previous Page
1 2 3 4
Next Page→

Have new content delivered to your inbox

Join 30 other followers

Blog at WordPress.com.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
 

Loading Comments...
 

    • Follow Following
      • deadhacker.com
      • Join 30 other followers
      • Already have a WordPress.com account? Log in now.
      • deadhacker.com
      • Edit Site
      • Follow Following
      • Sign up
      • Log in
      • Report this content
      • View site in Reader
      • Manage subscriptions
      • Collapse this bar