並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 8 件 / 8件

新着順 人気順

"Reverse Engineering"の検索結果1 - 8 件 / 8件

  • Software Architecture in an AI World

    Navigating New Constraints, Requirements, and Capabilities Like almost any question about AI, “How does AI impact software architecture?” has two sides to it: how AI changes the practice of software architecture and how AI changes the things we architect. These questions are coupled; one can’t really be discussed without the other. But to jump to the conclusion, we can say that AI hasn’t had a big

      Software Architecture in an AI World
    • Jailbreaking RabbitOS: Uncovering Secret Logs, and GPL Violations | Blog

      Welcome to my ::'########::'##::::::::'#######:::'######::: :: ##.... ##: ##:::::::'##.... ##:'##... ##:: :: ##:::: ##: ##::::::: ##:::: ##: ##:::..::: :: ########:: ##::::::: ##:::: ##: ##::'####: :: ##.... ##: ##::::::: ##:::: ##: ##::: ##:: :: ##:::: ##: ##::::::: ##:::: ##: ##::: ##:: :: ########:: ########:. #######::. ######::: ::........:::........:::.......::::......:::: CTF writeups, prog

      • Reverse-Engineering an IP camera - Part 1 | Alex Porto

        Epilogue A few days ago I had to replace the old IP camera I use to watch over my dogs and cats, and found out that IP cam technology changed a lot since I bought that old camera. IP cameras are now low-price and ubiquitous. I bought one of those generic models and installed it at my home, expecting to use the same software and network configuration I used before. However, these new cameras do not

        • x86re

          ___._ __..._ ,"' `'`- ``"-._ ,-"',` . ,' `-.._ / : .5Td8, . ~' `-. j _. ',8888888.`. \ _ 7 ;8888888888b. `. `' \,'`.`. |: , t8888888888888. . .`'. \` `'T8888888888888l. `. ^ `" \ Y : _ `8888"'```""8' ' J | --. :88P"sP"888b. ` . l .~ .( \ j '... j88b"`s `"sJ88 : `. |l dbs ;88888`""J8888l . J T-: Y8Y;888888888888888 'r . | ,sd8bs. ,sd8Y. `8.8888Y88888888888 ` : , | d88;`:88l d88;`:`| ? ,s88888888888

          • Carving ELF Files

            Recently, I created a simple tool, Carve Exe, to carve executables from other files (e.g. memory dumps or network traffic). Carving executables from binary blobs is a common task in digital forensics and reverse engineering. For example, when analyzing how a malware sample unpacks and deobfuscates itself. The problem of carving executables from binary blobs boils down to finding the beginning and

            • Revealing the Inner Structure of AWS Session Tokens

              TL;DR: A world first reverse engineering analysis of AWS Session Tokens. Prior to our research these tokens were a complete black box. Today, we are making it more of glass box, by sharing code and tools to programmatically analyze and modify AWS Session Tokens. Using this code we were able to take a seminal deep look into the contents of AWS Session Tokens, expose unknown facts about AWS cryptogr

                Revealing the Inner Structure of AWS Session Tokens
              • Reverse-engineering my speakers' API to get reasonable volume control

                Reverse-engineering my speakers' API to get reasonable volume control I got some fancy new speakers last week. They’re powered speakers and they have streaming service integrations built in, unlike the 35-year-old passive speakers I’m upgrading from. Overall they’re great! But they’re so loud that it’s difficult to make small volume adjustments within the range of safe volume levels for my apartme

                • 中国共産党の スパイ活動を暴く - Indo-Pacific Defense Forum

                  FORUMスタッフ 2023年1月下旬から2月上旬にかけて、米国本土を縦断した、高高度気球(米国戦闘機により撃墜)の鮮明な姿は、中国共産党のスパイ活動の広がりを各国に知らしめた。 中国は、以前にもこの種の監視技術を世界的に展開し、戦略的競争相手をスパイし、国際法と数十か国の主権を侵害してきた。米国国防総省報道官のパトリック・S・ライダー(Patrick S. Ryder)准将によれば、近年、同様の中国の気球が東アジア、ヨーロッパ、中南米、南米、東南アジアの上空で活動しているという。ライダー報道官は2023年2月の記者会見で、「これは中国の大規模な監視気球計画の一部だと我々は評価している」と述べた。 しかし、偵察気球は習近平中共総書記の下、世界支配的な軍事力だけでなく、経済的、社会的、政治的な支配力を確立しようとする中国共産党の包括的な戦略のほんの一部にすぎない。習政権は、競争相手に追いつき

                    中国共産党の スパイ活動を暴く - Indo-Pacific Defense Forum
                  1