deadhacker.com

security research repository of nathan andrew fain / cyphunk

  • Programmable Logic: What’s it to Ya? by Michael Barr from Embedded Systems Programming, June 1999 6 pages This document gives a basic overview of common programmable logic hardware: FPGA’s, CPLD’s and PLD. (Hold the mouse over links and acronyms to see their full definition or click to follow to their wikipedia entries). PLD In the…

    Read more

  • Herding Hash Functions and the Nostradamus Attack (presentation slides) by John Kelsey and Tadayoshi Kohno 8 pages of text The paper describes an attack that would allow an attacker to massage (“herd”) an object to a point where it matches a hash value chosen by the attacker prior. What appears to be an important restriction…

    Read more

  • Bugger The Debugger, Pre Interaction Debugger Code Execution By Brett Moore, CTO Security-Assessment.com. 10 pages of text, 3 of which are code. This paper describes a method to construct a binary which can run code before control is passed to a debugger. The method requires changing the PE header of an executable to reference your…

    Read more