Listing 1 is Bruce Schneier's Blowfish compiled and disassembled.
Listing 1: Example OllyDbg Disassembly
import socket
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('192.168.0.3', 3971))
s.send("strings")
s.recv(1024)
# repeat as necessary
subprocess.Popen(...).stdout
and stdin
ctypes.cdll
.
from Crypto.Cipher import Blowfish
import struct
from scapy.all import * data = sniff(count = 3) malicious_data = 'A' * 256 a = IP(src='77.11.22.33', dst='192.168.0.8') / TCP(sport=3971, dport=9911) / malicious_data send(a)
Joel R. Voss
Leviathan Security
Greets to h1kari, Frank Heidt, Mark, Chad, Kim Zetter, strydehax, Absolute Software, meee, Neg9, my mom, and everyone who has discussed this with me using their critical reasoning skills.
This wouldn't have been possible without each of you.
[1] Tridgell, Andrew. How Samba was written. URL: http://samba.org/ftp/tridge/misc/french_cafe.txt
[2] J-Security. "tinc VPN Replay Attack Vulnerability" URL: http://www.juniper.net/security/auto/vulnerabilities/vuln3837.html
[3] Unknown. Intro to Reverse Engineering - Part 2. URL: http://www.ethicalhacker.net/content/view/165/2/
[4] SynJunkie. Metasploit Payloads - msfpayload. URL: http://synjunkie.blogspot.com/2008/10/metasploit-payloads-msfpayload.html
[5] Unknown. Symmetric Encryption Algorithms. URL: http://www.encryptionanddecryption.com/encryption/symmetric_encryption.html
[6] Schneier, Bruce. Applied Cryptography.
[7] Mitre. CVE-2009-3555. URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
[8] Evers, Joris. Getting over laptop loss. URL: http://news.cnet.com/Getting-over-laptop-loss/2100-1044_3-6089921.html
[9] Sacco, Anibal and Ortega, Alfredo. Deactivate the Rootkit. http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=publication&name=Deactivate_the_Rootkit
[10] Clewell, Beatriz C., Campbell, Patricia B., Perlman, Lesley. Good schools in poor neighborhoods. 2007.
[11] Stevens, Tim. 66 OLPC XO '$100 Laptops' Stolen from Poor Kids. URL: http://www.switched.com/2008/06/22/66-olpc-xo-100-laptops-stolen-from-poor-kids/
[12] Ploskonka, Yama. First Ever Objective XO Laptop Usage Research Results. URL: http://www.olpcnews.com/implementation/evaluations/ceibal_objective_research_resu.html
[13] kem06853. "cant keep my hands out the cookie jar". URL: http://www.youtube.com/watch?v=NlCmmUD9eBY
[14] Halderman, J. Alex. "School's Laptop Spying Software Exploitable from Anywhere". URL: http://www.freedom-to-tinker.com/blog/jhalderm/schools-laptop-spying-software-exploitable-anywhere