Moving Off Google

Not long ago, a well-known games developer posted the following horror story: I have used and been burned by a number of Google services over the years but certainly didn’t think that attitude would extend to GMail. Yet it apparently has, and even to high profile users, which I am not. I’m also a bit […] Continue reading Moving Off Google

Posted in Uncategorized

rustun – Virtual Not Private Network in 100 Rust lines

While stuck at home I wrote a simple Linux tunnel (“VPN” but not encrypted/authenticated) in 100 lines of Rust. This is a PoC, not an OpenVPN replacement; just sending the IP layers and above over UDP. Specifically, it creates a tun device, enables the device, sets the device’s IP and netmask, and forwards packets in […] Continue reading rustun – Virtual Not Private Network in 100 Rust lines

Posted in Uncategorized

Stream Securely: Simply and Privately Preserving Live Video Evidence

Cell phone video has been a major game changer for society as a whole. While the vast majority of uses have been mere conveniences, and some have been negative, some have also been critical as evidence to document acts of aggression, violence, and other abuses. Innumerable attempts to cover up despicable behavior would never have […] Continue reading Stream Securely: Simply and Privately Preserving Live Video Evidence

Posted in Uncategorized

Should there be restrictions on the release of hacking tools?

This is a text outline of the interactive version available here 1.1. No. Authors of such software should decide for themselves what the best release policy should be 1.1.1. Pro: Authors of security tools are in the best position to make judgements on whether to share and how much, and routinely do 1.1.2. Pro: Pissing […] Continue reading Should there be restrictions on the release of hacking tools?

Posted in Uncategorized

Interface Identifier (IID) list

Interface Identifiers (IID’s) are used to obtain function tables to call most methods of COM objects. In source code, a name like IID_Column will be used, but when this is compiled, the binary will only have the corresponding GUID like {FD1C5F63-2B16-4D06-9AB3-F45350B940AB} embedded in the binary. When reverse engineering it is often unclear what IID a […] Continue reading Interface Identifier (IID) list

Posted in Uncategorized

Windows 10 Decontamination Scripts

One of the main benefits of our setup we have is that our system will not update automatically. The main problem though, is that it will not update automatically. But we still do want security updates, so it would be nice to let those through, while still blocking any other unwanted updates and the other undesirable activity that is also conducted from the same process (svchost.exe). So instead, I installed Python and wrote my own, which was far less difficult than I had originally assumed since you can generally scrape all the info you want from catalog.update.microsoft.com Continue reading Windows 10 Decontamination Scripts

Signed Malware

I recently saw a quote on Twitter along the lines of “I couldn’t be in threat intel because I’d get too carried away, go too far, and end up calling some hacker’s mom.” I had to laugh since I can relate. It is easy to get carried away and you can find a lot of […] Continue reading Signed Malware

Posted in Uncategorized

Hack-back in the Real World

ProtonMail just recently (yet briefly) bragged about shutting down a phishing campaign that it was the target of by hacking back the phishing server… Earlier this year, a member of the US Congress (Rep. Tom Graves) proposed the “Active Cyber Defense Certainty Act (ACDC)” to amend US law to allow private entities, with mandatory reporting requirements to law enforcement, to conduct certain forms of hack-back… Following this proposal, discussion online exploded… My timeline was filled with “If people tried hack-back, this would happen!” but you don’t have to hypothesize. You can see what did happen in the myriad examples of hack-back in the real world. So below I assembled a list of publicly recorded hack-backs, with the results of each and reference to original sources. Continue reading Hack-back in the Real World

Posted in Uncategorized