Author: gpanther

  • Surface mounted electronics

    I’ve landed on the Surface Mount Soldering 101 and my first thought was: this is really cool, I need to tell a friend of mine who as an ASUS WL-500gP wireless router and experienced some problems with the receiving part of it (he wanted to use the router as a repeater).

  • Playing tricks with the Windows PE Loader

    For every software there is a specification and there is the implementation. Specifications are rarely exhaustive, thus there remain the corner cases which the developer handles based on her/his believes. As long as the handling methods don’t introduce vulnerabilities, one can say that this doesn’t make any difference. The situation becomes much more interesting when…

  • Mixed links

    Seen on Slashdot: Alarm Raised On Teenage Hackers – my view on it: these kids shown the challenge to be on the defender’s side. IMHO most of them do this because they want to feel special. Showing them that attacking a system is pretty easy compared with defending it could win the over… This has…

  • Tag cloud

    Brought to you by Wordle:

  • No stress Perl

    What I like about Perl is that it is “turtles all the way down” (almost). You go in with the perl debugger (or something visual like ptkdb) and step through almost all the code and understand how it is done. See for example this post about “magically” turning on strict/warnings from a module. In the…

  • Mixed links

    From scriptnode comes: Multiline Strings in JavaScript. Interesting. From Think Vitamin comes: Reduce Your Business Costs With Free Stuff. Good list in the spirit of my Things you can get for free post (and much more comprehensive).

  • EH Challenge solution

    The solution to the Ethical Hacker challenge “It happened one Friday” has been posted. Read the full story behind the challenge or go directly to the solution. This is awesome! Remember that a new EH challenge is in full swing for your entertainment :-).

  • Fun with shellcode

    Didier Stevens posted an entry about some interesting stuff he found in a shellcode, so I thought that I share my little story: I was analysing a Word exploit, when I cam over the following code (written in pseudocode, because I can’t find the file right now): HANDLE h = 0; while (GetFileSize(h) != 1234)…

  • Solution to the malware challenge

    The deadline for submission to the malware challenge has passed, so I will post here my solution. Sorry for the rather poor presentation, but I exported it out from Word. Describe your malware lab. A virtual machine (VirtualBox[1]) with WindowsXP installed. OllyDbg[2] IDA 4.9 Freeware[3] PEiD[4] HxD[5] LordPE[6] ImpRec[7] What information can you gather about…

  • A small Slony-I tutorial

    Update: the altperl scripts seem to take away the need for most of the steps here. Take a look at the post Slony1-2.0.0 + PostgreSQL 8.4devel for an example for how to use them. When I first installed Slony-I to replicate between two PostgreSQL servers, it was very confusing. Now I am somewhat less confused…