Friday, June 14, 2013

Password Algorithms: Windows System Key (SYSKEY)

0 comments
I stumbled upon some forum posts related to System Key recently and read something about 1 of the authentication modes available to Administrators that made me wonder if true or not. Just to note, there are 3 modes. Generated by passphrase Stored in registry Stored on removable storage device 2...

Injecting arbritary Metasploit payloads into Windows executables.

0 comments
This is a very simple writeup, demonstrating how simple it is to use Metasploit to inject arbritary code into a Windows executable, effectively backdooring said executable. By backdooring a legitimate executable, we can effectively hide our “evil” code amongst a pile of “good” code, and backdoor...

Android Application Reverse Engineering. Reversing Angry Birds.

0 comments
Ok, so this article has been a long time coming. One of my pastimes is reverse engineering Android applications, just to see “what makes them tick”. In this article, in order to really drive this home, I will reverse engineer the popular “Angry Birds” application. Due to time constraints and basic...

Initial Analysis of “LuckyCat” APT Android Malware

0 comments
First off, I have not been writing as often as I like lately. Have a bunch of nice things half written, and no time at present to finish the damn things due to college. Anyway, on with the show! So I was browsing the Contagio Mobile Malware Dump and came across this: http://contagiominidump.blogspot.ie/2012/08/luckycata-android-apt-malware.html#more I...

Password Algorithms: Cisco Unified Personal Communicator

0 comments
This application took some time to acquire online because Cisco prevents you downloading unless you are: Direct Customer Partner-Reseller Service Contract Owners CCIE Professional PICA Customer I’ve installed on my Windows 7 workstation so results may differ.There’s a checkbox beneath the username...

Password Algorithms: Internet Explorer 7, 8, 9

0 comments
Introduction IE10 on Windows 8 uses a different algorithm for encryption and storage so I might follow up with separate entry later. For now I’m analysing version 9.0.9 on Windows 7.Everything here should work fine with legacy IE 7 and 8. Considering customers may avoid migrating to...

Password Algorithms: Bomgar Remote Desktop Software

0 comments
Introduction This will just be a short write up on something I looked at earlier today out of curiosity.Bomgar is a Remote Desktop application used mainly by corporations.I’m not entirely sure why it’s preferred over other Remote Desktop solutions; seecomparisons here. One could speculate it’s...