By: Meder Kydyraliev
PBOUNCE stands for Pivoting BOUNCEr and it has been inspired by bounce-0.0.1
by Fyodor Yarochkin which can be downloaded from http://o0o.nu/sec/tools/.
PBOUNCE was written from scratch reusing unixlib portability library from
the original bounce.
By: Brien M. Posey
We are pleased to announce that the latest edition of the HITB e-zine (Issue #37) has been released. This is a pretty special edition with article contributions by Shreeraj Shah (Net-Square), Cesar Cerrudo (Argeniss) and Nish Bhalla (Security Compass).
For those of you waiting for the videos of HITBSecConf2005 - Malaysia, they are on their way to Europe and will be released on the 24th of December 2005. In the meantime you'll have the e-zine to enjoy :)
Merry Christmas and a Happy New Year everyone! See you guys in 2006.
By: Cesar Cerrudo
This paper is an advisory but mostly it describes a mistake made by Microsoft on patch MS05-018 where Microsoft failed to properly fix a vulnerability having to release a new patch MS05-049. Hopefully this paper will open the eyes to software vendors to not repeat this kind of mistakes.
This article deals with reverse engineering of a shareware tool and how to go about writing a proper keygen for it.
0x2. Observing our victim
0x3. Jumping inside the code
a. Understanding how it works
b. Understanding the interesting code
c. Calculating the serial
0x4. Writing the keygen
0x5. Shouts0x1: Tools
The tools used in this tutorial are a brain, windows calc.exe (for hex-decimal
conversions for example), OllyDbg 1.10, Dev-C++ 4 for writing the keygen.