security research repository of nathan andrew fain / cyphunk
Update: link to Halvar & SP at Zynamics post and slides from CanSecWest Bincrowd, a project I had the pleasure of co-authoring with Zynamics, from conception to co-coding back-end and front-end.. Bincrowd simplifies the collaborative option in reverse engineering and brings it en masse. Any function a user has ever submitted documentation for can be…
Update: added section with references to all the OSS jtag tools I know of. Can be of assistance when debugging or adding features. Update: added user submitted voltage conversion board design for bidirectional i/o JTAGenum is an open source Arduino (and RaspberryPi) based hardware platform I built last year with three primary goals: [1. Given a…
My workflow for threat weighted hardware analsysis or research has changed with time. Slight uniformaty has found its way into my routine which is helpful for cross referencing knowledge between projects. With the curse of multitasking projects a constant this also reduces the time required to switch between projects or pickup on an old project. I’d…
These are tools that let one run a process and, in a sense, selectively debug by telling the tool to perform analysis when conditions are met in the kernel, such as when a certain argument is sent to sendto() one could replace it on the stack with their own value. You could write your own…
Update: added routine to print out hex data for blocks where entropy passes a given threshold. Update: GUI display of graph (using TK) was not working on my system. Code now saves an image of the results in addition to attempting to display with GUI. Update: These days I use a slightly modified libdisorder and…
Formal aspects of mobile code security – Chapter 5 PhD thesis for Richard Drews Dean 23 page chapter. Incomplete: Need to discuss how the author discovered attacks. Need to check my description using the detailed equations provided. I must illustrate the attack methods. The interest in this thesis is due to its reference in Heard…
By Nathan Fain Incomplete: must create detailed diagram for compression functions. The following simplifies the specification of SHA-1 in an easy to digest form. First we will cover the general structure of the algorithm. Detail of the expansion and compression routines are covered separately. First we start with a message. The message is padded and…
An Illustrated Guide to Cryptographic Hashes by Steve Friedl 15 pages of text Update 2006.02.11: clearer explanation of CTFP preimage resistance. This is a very good introduction to what a hash algorithm is, what it is for and what collisions are all about. It does not cover specific details, only the general understanding. It’s a…
Visual Basic Reversed – A Decompiling Approach by Andrea Geddon 27 pages, 20 of code. Update 2006.02.11: more intuitive structure list and directions of use. This is would have made for a good introduction to reversing Visual Basic if it were not for a few errors. One can still learn a bit about the data…