June 11th a Microsoft engineer accidentally leaked 4GB of Microsoft PlayReady internal code. It was leaked on the Microsoft Developer Community. The leak includes:
- WarBird configurations
- WarBird libraries for code obfuscation functionality
- Libraries with symbolic information related to PlayReady
Researchers from AG Security Research Lab were able to successfully build the Windows PlayReady dll library from the leaked code. Interestingly, they were assisted because on the Microsoft Developer Community forum a user also provided step-by-step instructions on how to begin the build process.
Also, interestingly, interestingly, the Microsoft Symbol Server doesn't block requests for PDB files corresponding to Microsoft WarBird libraries, which inadvertently leaks more information.
Adam Gowdiak of AG Security Research Lab reported the issue and Microsoft removed the forum post. However, as of this writing, the download link is still active.
File listing is below. Forums screenshots are attached. All information discovered by AG Security Research Lab
File listing: https://pastebin.com/raw/i65qfd2z
- WarBird configurations
- WarBird libraries for code obfuscation functionality
- Libraries with symbolic information related to PlayReady
Researchers from AG Security Research Lab were able to successfully build the Windows PlayReady dll library from the leaked code. Interestingly, they were assisted because on the Microsoft Developer Community forum a user also provided step-by-step instructions on how to begin the build process.
Also, interestingly, interestingly, the Microsoft Symbol Server doesn't block requests for PDB files corresponding to Microsoft WarBird libraries, which inadvertently leaks more information.
Adam Gowdiak of AG Security Research Lab reported the issue and Microsoft removed the forum post. However, as of this writing, the download link is still active.
File listing is below. Forums screenshots are attached. All information discovered by AG Security Research Lab
File listing: https://pastebin.com/raw/i65qfd2z
👍6
Source Byte
Julian assange is free ;)
This media is not supported in your browser
VIEW IN TELEGRAM
welcome back :)
🔥7👍4🤡1🤣1
What is a "control-flow flattening" obfuscation technique?
https://reverseengineering.stackexchange.com/questions/2221/what-is-a-control-flow-flattening-obfuscation-technique
#malware_dev
https://reverseengineering.stackexchange.com/questions/2221/what-is-a-control-flow-flattening-obfuscation-technique
#malware_dev
🤯9😁3👾1
The Manga Guide to Cryptography 😂
internet is a weird place ....
internet is a weird place ....
😁6❤4👍4✍2
Develop your own RAT - AV & EDR Defense
credit : @dobinrutis
code : A C2 framework and RAT written in Go.
slides : 👇🏻
#go , #golang , #c2 , #malware_dev
credit : @dobinrutis
code : A C2 framework and RAT written in Go.
slides : 👇🏻
#go , #golang , #c2 , #malware_dev
🔥5👍1👾1
INTRODUCTION TO GO REVERSING_bhack_2021_alexandreb.pdf
3.6 MB
Blackhat 2021
--------------------
Related:
AlphaGolang | A Step-by-Step Go Malware Reversing Methodology for IDA Pro
Reversing Golang
#reverse #golang
--------------------
Related:
AlphaGolang | A Step-by-Step Go Malware Reversing Methodology for IDA Pro
Reversing Golang
#reverse #golang
❤6👾1
Forwarded from جز آستان توام در جهان پناهی نیست
❤10👍3😱2👾1
Signal Labs – Offensive Tool Development 👆🏻
https://signal-labs.com/trainings/offensive-tool-development/
https://signal-labs.com/trainings/offensive-tool-development/
❤5🤯2👍1👾1
OSDev wiki
Our wiki and forums provide 200k+ posts and 725 articles about the creation of operating systems.
https://wiki.osdev.org/Expanded_Main_Page
fork version :
https://osdev.wiki/wiki/Expanded_Main_Page
Our wiki and forums provide 200k+ posts and 725 articles about the creation of operating systems.
https://wiki.osdev.org/Expanded_Main_Page
🔥7
Forwarded from کانال بایت امن
Packer-Protector-Sources-By-@securebyte.rar
13 MB
#Source #PE
I have been collecting this package, which includes sources for packers and protectors, for years and shared it on the Exetools forum in 2014. I am grateful to the friends who helped me gather this excellent resource.
This collection includes packers and protectors written in programming languages such as C, C++, ASM, Delphi, and VB. If you are interested in PE topics and programming packers and protectors, this package is ideal for you.
Exetools link: https://forum.exetools.com/showthread.php?t=16128
If you can also help in collecting more sources, please get in touch with me.🌐 @YMahmoudnia
🦅 کانال بایت امن | گروه بایت امن
_
I have been collecting this package, which includes sources for packers and protectors, for years and shared it on the Exetools forum in 2014. I am grateful to the friends who helped me gather this excellent resource.
This collection includes packers and protectors written in programming languages such as C, C++, ASM, Delphi, and VB. If you are interested in PE topics and programming packers and protectors, this package is ideal for you.
Exetools link: https://forum.exetools.com/showthread.php?t=16128
If you can also help in collecting more sources, please get in touch with me.
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5🔥1