Tonight we had presentations from vesh, porkchop (his last SAHA!, congrats on the new gig and we are waiting for the start of AtlantHA!), and Dave. Dave’s cowsay challenge is up at http://184.108.40.206/ the script running on the server is https://gist.github.com/david-miller/cc4655b705ffa4fe33cc if you want to take a crack at it.
I know I’m slow…but that can be good in certain quests. I would recommend the following to accomplish this challenge. Windows VM via Virtual Box or VM Player/Workstation Ollydbg or ImmunityDBG (IDA Free is an overkill) Favorite programming/scripting language (Python, Ruby, PHP, C#, whatever++) The challenge is to download this file > tini.dat < and make […]
Nice job to everyone who presented, (Ivory, ScriptJunkie, Phn1x, vesh, and porkchop). We had a good opening with Debi who is organizing Codejam at Geekdom September 28th (that weekend). Stay tuned to the list for more updates.
For those who read the announcements, the good folks in Dallas and Houston are trying to bring together their people to coordinate DAHA! and HAHA!. If you are moving or live in either area, get on the AHA! and SAHA! lists (the Austin list is prolly a better bet since it has more people in […]
This SAHA! meeting we had presentations on fuzzing Java through JNI, a DEFCON/BH recap, and some firmware RE items.
Since a good portion of us will be in Vegas for the conferences, and there is a dearth of after-hours activities at DEFCON, we may schedule a small shindig…stay tuned
- Iv0rywolf presented a phishing aggregat0r and diseminat0r – vesh presented on auto generating syscall driven shellcode – eric presented on threat analysis and intelligence driven incident response – we had a sponsor tonight, Modis bought our food and we are ever greatful!!!
Still in the Beta phase but you get the idea: https://github.com/darkparticlelabs/Shellack
Compilation/Debug Cheatsheet for Cygwin (put the NDK and SDK in your Cygwin home dir) Note for all: Additional include dirs, and libs may be required for compilation depending on the functionality you want to add for x86: client> g++.exe -fno-stack-protector -ggdb -static file.c -o file.exe client> gcc.exe -fno-stack-protector -ggdb -static file.c -o file.exe for x64: […]
Scriptjunkie – Outline: Setting up a VM sandbox integrated into your OS as a filetype handler. By the end of the training, when you open selected file types like .pdf’s, they’ll actually open in the sandbox, and you’ll be effectively immune from that type of exploit even though you may not notice anything different. Also, […]