World’s worst hacker
Debugging the MBR with IDA Pro and Bochs
Analyzing the MBR is sometimes required during a forensic process, if you suspect a malicious activity that is not detected on-line. With static analysis, you may see if an obvious corruption happened, but you will need to debug to learn more. Prerequisite : IDA Pro (6.0) with the IDA Python plug-in (1.4.3) Steps : Prepare…
Continue Reading
A link between Stuxnet and the OpenBSD IPSEC backdoor rumor ?
Corrupted virtual disk with VMware
Wow, this article and especially one of its comments saved my day. My computer crashed and one of the VMware machine hosted on it could not start anymore : “Cannot open the disk ‘path of vmdk’ or one of the snapshot disks it depends on. Reason: the specific virtual disk needs repair. Checking on the…
Continue Reading
Homepage mascotte, here and now !
Well, following a suggestion from my wife, I decided to bring up a mascotte for this website. I admit that it was a lot of fun playing with Gimp and Inkscape, which are really great tools. So please welcome our new little spiky friend : I hope that you have nothing against hedgehogs, which should…
Continue Reading