Cómo funcionan ltrace y strace, y en qué se diferencian
- March 20, 2016
- tuxotron
ltrace y strace son dos herramientas comunes en sistemas *NIX que son súper útiles a la hora de ver las llamadas a librerías y sistema de un proceso o aplicación. Muy útiles a la hora de depurar un proceso o hacer ingeniería inversa.
En estas dos entradas:
El autor nos explica el funcionamiento interno de ambas y las diferencias entre las mismas. Son entradas muy cortas, pero muy educativas.Vídeos de Black Hat Europe 2015
- March 9, 2016
- tuxotron
- Keynote: What Got Us Here Wont Get Us There
- Bypassing Self-Encrypting Drives (SED) in Enterprise Environments
- Breaking Access Controls with Blekey
- Cybersecurity for Oil and Gas Industries: How Hackers Can Manipulate Oil Stocks
- Panel: What You Need To Know About The Changing Regulatory Landscape In Information Security
- Attacking The XNU Kernel In El Capitain
- Automating Linux Malware Analysis Using Limon Sandbox
- Even The Lastpass Will Be Stolen, Deal With It!
- Silently Breaking ASLR In The Cloud
- A Peek Under the Blue Coat
- Androbugs Framework: An Android Application Security Vilnerability Scanner
- Stegospolit - Exploit Delivery With Steganography and Polyglots
- Watching The Watchdog: Protecting Kerberos Authentication With Network Monitoring
- Authenticator Leakage Through Backup Channels on Android
- Cybercrime in The Deep Web
- Hey Man, Have You Forgotten To Intialize Your Memory?
- Unboxing The White-Box: Practical Attacks Against Obfuscated Ciphers
- Commix: Detecting and Exploiting Command Injection Flaws
- Is Your Timespace Safe? - Time and Position Spoofing Opensourcely
- Lessons From Defending The Indefensible
- Your Scripts In My Page - What Could Possibly Go Wrong?
- Continuous Intrusion: Why CI Tools Are An Attacker's Best Friends
- Going Auth The Rails On A Crazy Train
- Hiding In Plain Sight - Advances In Malware Covert Communication Channels
- LTE & IMSI Catcher Myths
- How To Break XML Encryption - Automatically
- Implementing Practical Electrical Glitching Attacks
- (In-)Security of Backend-As-A-Service
- Defending Against Malicious Application Compatibility Shims
- Exploiting Adobe Flash Player In The Era Of Control Flow Guard
- Fuzzing Android: A Recipe For Uncovering Vulnerabilities Inside System Components In Android
- VOIP Wars: Destroying Jar Jar Lync
- Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
- New (And Newly - Changed) Fully Qualified Doman Names: A View of Worldwide Changes to DNS
- Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers
- Vulnerability Exploitation In Docker Container Environments
- All your Root Checks Belong To Us: The Sad State of Root Detection
- Bypassing Local Windows Authentication To Defeat Full Disk Encryption
- New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels
- Triaging Crashed With Backward Taint Analysis For Arm Architecture
- Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015
Después de las diapositivas, ya se han puesto disponible los vídeos de Black Hat Europe 2015:
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec