Quantcast
Channel: 133tsec.com » Exploit Dev/Reverse Engineering
Browsing latest articles
Browse All 8 View Live

Image may be NSFW.
Clik here to view.

A reversing / analysis approach of FlexCrypt : Exploitation-one failed

- The following stuff is done in an environment of Win XP SP3 VM w/ .NET v2.0 .. Also tested in Win7x64 and Win7x86 - - Tools used : Just ollydbg - App can be found in...

View Article



Image may be NSFW.
Clik here to view.

Manual code injection for runtime executable decryption : An Antivirus bypass...

In this post I show a way to inject data in an executable, and some code, to encrypt with xor the whole code segment.. As an example, I’ll use a virus executable, encrypt it in this way and upload it...

View Article

Image may be NSFW.
Clik here to view.

PoURaN PE-Encryptor: A XOR based encryptor injecting code to EXE/DLL...

  - =[ The tool presented in this post, is the automatic process of what presented manually here : 133tsec previous post ]= - What did I use: PEditor - to check fast the pe header values.. Ollydbg -...

View Article

Metasploit Sniffing victim’s network

Aloha, Lets see how we can use the Metasploit framework to sniff the victim’s network and what we can get from that. Our Lab: A  MacBook with Vmware Fusion on it. Target: A Virtual Guest with Windows...

View Article

Image may be NSFW.
Clik here to view.

PoURaN PE-Cryptor v1.01

PoURaN PE-Cryptor v1.01 cpp/asm source This time contains the executable too… Yes am back… And this is a very short post.. I just made a new version for the PE-Cryptor because I needed to make the...

View Article


Image may be NSFW.
Clik here to view.

API Hooking tool injecting code in the PE: tool explanation and application...

Hello again.. There was a long time since my last post, cos i was busy with several issues, but most time with this tool.. Checking it’s operation, testing the hooked PE in different OSs, changing the...

View Article

Image may be NSFW.
Clik here to view.

0day: Mikrotik’s Winbox Client Side attack. A remote code execution exploit

Hello ppl, In this post I wanna present you a vulnerability I found and exploited, concerning Winbox. Winbox is the client that controls mikrotik routers.. It is a popular router OS. For more info...

View Article

Image may be NSFW.
Clik here to view.

0day DoS: Mikrotik Server side DoS attack

Intro.. After exploring the winbox clientserver protocol, i wanted to find some ways to get rid of winbox service and winbox client… This finding, has to do only with the mikrotik router, who has...

View Article

Browsing latest articles
Browse All 8 View Live




Latest Images