@larsborn has moved

My new profile is at @larsborn

@larsborn has movedlarsborn
2024-01-02

I first stumbled upon this in the malware family but this rule is not characteristic to that family. It just makes sure that next time there's aPLib in something I'm analyzing, I save a ton of time.

@larsborn has movedlarsborn
2024-01-02

An easy way to speed up reverse engineering is to build up a repository of YARA rules covering benign algorithms.

This rule matches on aPLib, a compression algorithm on the more exotic side. It doesn't use assembly instructions or strings necessary to actually run the algorithm but merely a copyright string, version information, and authorship reference.

@larsborn has movedlarsborn
2024-01-02

```
rule APLib_Strings
{
strings:
$ = "aPLib v1.1.1 – the smaller the better :)"
$ = "Copyright (c) 1998-2014 Joergen Ibsen, All Rights Reserved."
$ = "More information: ibsensoftware.com/"
condition:
any of them
}
```

github.com/100DaysofYARA/2024/

@larsborn has moved boosted:
2024-01-01

import "time" rule year_2024 { condition: time.now() >= 1704067200 }
#100DaysofYARA

@larsborn has movedlarsborn
2023-12-30

For my fellow travelers of the tubes, I OCRed the SHA256 hash in this presentation: 9eca6884b5ec136cdc9f4e89fa728d0a2b6d5b4ff9bc9c94538496dcb7d18111

@larsborn has moved boosted:
2023-12-29

Breaking "DRM" in Polish trains has been released on media.ccc.de media.ccc.de/v/37c3-12142-brea

@larsborn has movedlarsborn
2023-12-28

@shellsharks this category of nullteilerfrei might be worth adding: blag.nullteilerfrei.de/categor

@larsborn has movedlarsborn
2023-12-26

On my way to . HMU if you want to meet and chat. I can offer malware reverse engineering, normal software forward engineering, salsa dancing, high school maths++, and podcasting as topics.

@larsborn has moved boosted:
David Buchananretr0id@retr0.id
2023-12-24
I finally got around to explaining how I made this partial hash collision https://www.da.vidbuchanan.co.uk/blog/colliding-secure-hashes.html
A visualisation of two surprisingly similar sha256 hashes. Matching digits are green (12 at the start, 12 at the end, 7 in the middle), and nearby digits are yellow (5 of those). The full text is: sha256(retr0id_662d970782071aa7a038dce6) = 307e0e71a409d2bf67e76c676d81bd0ff87ee228cd8f991714589d0564e6ea9a, sha256(retr0id_430d19a6c51814d895666635) = 307e0e71a4098e7fb7d72c86cd041a006181c6d8e29882b581d69d0564e6ea9a
@larsborn has movedlarsborn
2023-12-23

11.0 just dropped. BSim, Go, Rust, GhidraGo URLs... that's all well and good. But have you seen the anniversary video?! The dragon is munching!

youtube.com/watch?v=0rz5tg6LKcU

@larsborn has movedlarsborn
2023-12-22

@23n27 @G33KatWork it's also what NASA's doing. Rule 7: "Check the return value of all nonvoid functions, or cast to void to indicate the return value is useless".

You know. For space code.

@larsborn has moved boosted:
2023-12-18

Does anyone know the contact details of someone on the "Open Source Team Endgeräte" at Telekom?

I would very much like to contact them regarding the GPL source code for the Telekom Speedport Pro router 😍

UEFITool output of Telekom Speedport Pro router firmware
@larsborn has moved boosted:
[realhackhistory@home]#realhackhistory@chaos.social
2023-12-16
@larsborn has moved boosted:
Shafik Yaghmourshafik@hachyderm.io
2023-12-16

This paper proposes that emergent abilities attributed to LLMs are a mirage and an artifact of the metrics used.

Using more appropriate metrics makes the emergent behavior disappear: arxiv.org/abs/2304.15004

@larsborn has moved boosted:
2023-12-14

Viewing Microsoft’s technical specifications in IDA? That’s possible with Alexander Hanel’s Plugin – msdocviewer. Read our new #PluginFocus article and learn more about this simple but helpful tool 🌐 hex-rays.com/blog/plugin-focus

#IDAPython

Plugin Focus -msdocviewer
@larsborn has movedlarsborn
2023-12-11

@G33KatWork it really was a crazy time (thanks for leading me down another Wikipedia rabbit hole)

@larsborn has moved boosted:
nixCraft 🐧nixCraft
2023-12-11

The handover

The handover comic. Two code monkeys are in front of the computer.  The monkey number 1 tells monkey number 2, this is my code.  It’s your problem now. I’m out. The monkey number 1 walks out, probably indicating that he quit the job as a code monkey.
@larsborn has moved boosted:
Cindʎ Xiao 🍉cxiao@infosec.exchange
2023-12-09

🦀 🧵 Rust reversing thread: Let's use panic metadata embedded inside Rust binaries to help us reverse engineer!

(If you prefer reading this thread as a blog post, you can read it here! Using panic metadata to recover source code information from Rust binaries - cxiao.net)

If you've ever looked inside the strings of a Rust binary, you may have noticed that many of these strings are paths to Rust source files (.rs extension). These are used when printing diagnostic messages when the program panics, such as the following message:

thread 'main' panicked at 'oh no!', src\main.rs:314:5

The above message includes both a source file path src\main.rs, as well as the exact line and column in the source code where the panic occurred. All of this information is embedded in Rust binaries by default, and is recoverable statically!

Examining these can be useful in separating user from library code, as well as in understanding functionality. This is especially nice because Rust's standard library and the majority of third-party Rust libraries are open-source, so you can use the panic strings to find the relevant location in the source code, and use that to aid in reversing.

#rust #rustlang #ReverseEngineering #MalwareAnalysis

@larsborn has moved boosted:
Philippe Lagadecdecalage
2023-12-04

Just released olefile 0.47 - a python parser for MS OLE/CFB files, used by many projects such as Pillow, oledump, oletools.
This is a long overdue release with several new features and bugfixes.
github.com/decalage2/olefile
pypi.org/project/olefile/

Thanks to all the contributors who are helping me on this project!
Changelog: github.com/decalage2/olefile/b

I am resuming the work on this project, so new features might be added soon.

@larsborn has moved boosted:
2023-11-23

36 years ago today was the Max Headroom TV STL hijacking. en.wikipedia.org/wiki/Max_Head

I regard this incident as the best and purest hacking prank in modern history. The combination of sophisticated, meticulous technical planning and execution, utterly juvenile content, essential harmlessness, lack of financial motive, and never getting caught or identified (or later taking credit) remains, in my opinion, unmatched to this day.

Pure art.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst