Connect With Us:

HowTo

Reverse
by Mathieu Renard/ on 09 Sep 2023

Getting a symbolized kernel !

Finding kernel symbols is essential for debugging such payloads because it provides valuable information about the internal state of the kernel and the execution of the system. Without symbols, it is difficult to identify the source of errors, trace the execution path, or set breakpoints at specific locations in the code. Debug symbols contain information about the function names, variable names, line numbers, and other relevant metadata that are necessary for debugging. By including debug symbols in the kernel, developers can better understand the behavior of the system and diagnose and fix issues more efficiently.

DMA
by Mathieu Renard/ on 09 Sep 2023

Debugging the PCILeech code executed on targeted systems under DMA attack !

Direct Memory Access is a feature that enables transferring data between peripherals and/or memory at the highest possible speed. This is done using direct hardware access to read or to write to the main memory without any supervision or interaction from the main CPU. DMA connections and accessories have become widely adopted due to their numerous uses and to the very important speedup they allow.

Python
by Mathieu Renard/ on 07 Feb 2019

Writing a scapy dissector

New Scapy Layer: Example implemeting HSRP v2

The Scapy library provides powerful capabilities for packet manipulation. However, sometimes, specific protocols or packet types might not be natively supported. In such cases, you can extend Scapy by implementing custom layers. In this article, we’ll walk through the steps of adding support for the Hot Standby Router Protocol (HSRP) version 2 as an example.