Looking for Pi in the 8087 Math Coprocessor Chip

Even with ten fingers to work with, math can be hard. Microprocessors, with the silicon equivalent of just two fingers, can have an even harder time with calculations, often taking multiple machine cycles to figure out something as simple as pi. And so 40 years ago, Intel decided to give …read more

Continue reading Looking for Pi in the 8087 Math Coprocessor Chip

“DB” = Abbreviated Microcontroller Debugging

We’ve all been there. When debugging a microcontroller project, we just want to put in a print statement to figure out what’s going on with the microcontroller in real time. However, advanced embedded programmers know that printf statements are verboten: they’re just too SLOW. While not fixing this plight entirely, [Atakan Sarioglu] has come up with a clever way to create readable debug messages with minimal runtime overhead.

[Atakan Sarioglu]’s innovation, called BigBug (Github), is a dynamically-generated codebook. The codebook translates abbreviated messages sent over serial (UART here) to longer-form human-readable messages. To generate the codebook, BigBug automatically parses your …read more

Continue reading “DB” = Abbreviated Microcontroller Debugging

Rick Fernandez, LogRhythm – Enterprise Security Weekly #16

Rick Fernandez is the Sr. Sales Engineer focused on Sales Integrators at LogRhythm. The discussion is about what Sis want isn’t that different from the Enterprise. They discuss automating the hunt, contextualizing and enriching before analysts have to … Continue reading Rick Fernandez, LogRhythm – Enterprise Security Weekly #16

The MITRE ATT&CK Framework: Privilege Escalation

Anyone who has had any experience on the offensive side of security has had fun with privilege escalation. There’s something exciting about exploiting a system to the point of getting root-level access. Since I have spent most of my time on the d… Continue reading The MITRE ATT&CK Framework: Privilege Escalation

[SANS ISC] Converting PCAP Web Traffic to Apache Log

I published the following diary on isc.sans.org: “Converting PCAP Web Traffic to Apache Log“: PCAP data can be really useful when you must investigate an incident but when the amount of PCAP files to analyse is counted in gigabytes, it may quickly become tricky to handle. Often, the first protocol

[The post [SANS ISC] Converting PCAP Web Traffic to Apache Log has been first published on /dev/random]

Continue reading [SANS ISC] Converting PCAP Web Traffic to Apache Log

Twitter Asks Users to Change Passwords After Finding Internal Log Bug

Twitter is asking its more than 330 million users to change their passwords after it discovered a bug within one of its internal logs. On 3 May, CTO Parag Agrawal announced the discovery of a weakness that had undermined Twitter’s secure sto… Continue reading Twitter Asks Users to Change Passwords After Finding Internal Log Bug

Getting Useful Info From the Log Hell with Awk

Getting useful info from log file should be piece of cake …if the file is properly formatted! Usually, one event is written on a single line with useful info delimited by a separator or extractable using regular expressions. But it’s not always the case, welcome to the log hell… Sometimes,

[The post Getting Useful Info From the Log Hell with Awk has been first published on /dev/random]

Continue reading Getting Useful Info From the Log Hell with Awk