blog.relentless-coding.org
Relentless Coding... so much to code, so little time ...
http://blog.relentless-coding.org/
... so much to code, so little time ...
http://blog.relentless-coding.org/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Thursday
LOAD TIME
0.9 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
16
SSL
EXTERNAL LINKS
36
SITE IP
172.217.6.83
LOAD TIME
0.937 sec
SCORE
6.2
Relentless Coding | blog.relentless-coding.org Reviews
https://blog.relentless-coding.org
... so much to code, so little time ...
Relentless Coding: July 2010
http://blog.relentless-coding.org/2010_07_01_archive.html
So much to code, so little time . Friday, July 9, 2010. New Javascript packer: JSidle. Over the last weeks I worked on a new Javascript packer that incorporates some new ideas. The main goal was to make it useful in penetration testing - thus, all used techniques try to circumvent automated analysis (e.g. used by anti virus products). I did not try to make it especially hard for manual analysis. The Javascript obfuscator I released some months ago (see here. The resulting JS code will take a short time t...
Relentless Coding: Analyzing the Blackhole Exploit Kit 2.0 with JSDetox
http://blog.relentless-coding.org/2012/09/analyzing-blackhole-exploit-kit-20-with.html
So much to code, so little time . Thursday, September 27, 2012. Analyzing the Blackhole Exploit Kit 2.0 with JSDetox. With the release of the new Blackhole Exploit Kit version. I wanted to check if JSDetox. Is still able to analyze it. As it turns out, the process is not much different from the last version (shown in this screencast. The obfuscated iframe leading to the exploit kit sounds interesting, so lets use that one:. Wget -O pho.htm "basijkarmandan.danaportal.ir/pho.htm". Downloading the content o...
Relentless Coding: January 2014
http://blog.relentless-coding.org/2014_01_01_archive.html
So much to code, so little time . Tuesday, January 14, 2014. JSDetox 0.2 released. I commited some changes to JSDetox last december, fixing some bugs and introducing new features. The following bugs are now fixed:. Handling of anonymous function calls (see Issue #7. Upload of files containing UTF-8 characters (see Issue #9. Handling of Prefix/Postfix Operators (like "i ") in static analysis (thanks to Jackmcbarn). Appart from the bug fixes, the following improvements/features got implemented:. Executed&#...
Relentless Coding: Combining the Quicktime "Marshaled_pUnk" exploit with JSidle
http://blog.relentless-coding.org/2010/09/combining-quicktime-marshaledpunk.html
So much to code, so little time . Thursday, September 16, 2010. Combining the Quicktime "Marshaled pUnk" exploit with JSidle. The Quicktime "Marshaled pUnk" exploit works well with a Javascript packer to circumvent AV detection as it solely relies on Javascript code. Quite often a web based exploit needs a special setting (HTML objects, data files etc.) beside the Javascript code and therefore makes it easier to create an AV signature. The current metasploit module for the exploit (see here.
Relentless Coding: February 2010
http://blog.relentless-coding.org/2010_02_01_archive.html
So much to code, so little time . Tuesday, February 23, 2010. Bypassing Antivirus using De-Obfuscation. About six months ago I was working on an idea for a new executable packer. Before I started coding, I performed some tests to see how easy current Antivirus products can be bypassed. I chose the tool PwDump3 for testing as I did not want to handle real malware for the small test and this was sufficient as most AV products detect it as malicious software. Two of my tests were quite simple:. It should be...
TOTAL PAGES IN THIS WEBSITE
16
Pentest N00b
http://pentest-n00b.blogspot.com/2009/08/well-past-few-weeks-have-been-little.html
Monday, 24 August 2009. Well the past few weeks have been a little busy @ work so have not had much time to further my knowledge. I have managed to read about and try to understand how exploits are found and how the exploiter alters the application code to enable an exploit to run in an application, this was mainly utilising the buffer overflow method. There are some nice tutorials here @ Peter Van Eeckhouttes Blog. Http:/ www.corelan.be:8800/. Catch you all soon. Subscribe to: Post Comments (Atom).
Pentest N00b: Re Think On Pentest Lab - We Go Totally Open Source
http://pentest-n00b.blogspot.com/2010/07/re-think-on-pentest-lab-we-go-totally.html
Thursday, 8 July 2010. Re Think On Pentest Lab - We Go Totally Open Source. Having played around with my previous Virtual Pentest Lab and found it more than up to the job, Citrix's Xenserver is after all the best Virtualisation system around and for not very much money or free if you don't need the fancy extra's - I have a 2 node Xenserver system with an OPenFiler SAN at the office without the essentials licence and it makes life sooooo easy. Give it a try and watch this space for future developments.
Pentest N00b: Welcome To The Pentest N00b
http://pentest-n00b.blogspot.com/2009/08/welcome-to-pentest-n00b.html
Friday, 7 August 2009. Welcome To The Pentest N00b. This is my first post on my new blog, hopefully this is were I'll attempt to map my progress as a Pentester N00b. I've already started on the road to enlightenment, I've bought some books, I got a netbook with backtrack 4 on it and I've been following some respected blogs, listening to podcasts and reading on security websites - I'll elaborate on the above in future posts. Hope this is gonna be a pleasant journey through the security universe.
Pentest N00b: September 2010
http://pentest-n00b.blogspot.com/2010_09_01_archive.html
Wednesday, 15 September 2010. New Adobe 0day - CVE-2010-2883. Having read that some folks have had mixed results with the Metasploit exploit, I decided I would try and find some reason why. I started out by running up Metasploit and setting up the exploit. Msf use exploit/windows/browser/adobe cooltype sing. Msf exploit(adobe cooltype sing) set PAYLOAD windows/meterpreter/reverse tcp. PAYLOAD = windows/meterpreter/reverse tcp. Msf exploit(adobe cooltype sing) set LHOST 192.168.0.79. Msf exploit(adobe coo...
Pentest N00b: Upcoming Pentest Lab
http://pentest-n00b.blogspot.com/2010/01/upcoming-pentest-lab.html
Tuesday, 5 January 2010. Having read the latest blog posts from Syn Junkie, I have decided to setup my own pentest lab. Following Syn's recommendations I have decided to to lean on virtualization to provide the basis for my lab. I too have 3 laptops, 1 x Lenovo Thinkpad Z61p running Citrix Xenserver 5.5.0. 1 x Lenovo Thinkpad X60s running Ubuntu 9.10 and KVM. 1 x ASUS EEEPC 1000HE Hackbook running Backtrack 4. I look forward to publishing my exploits with my new Pentesting lab. View my complete profile.
Projects | Relentless Coding
http://relentless-coding.org/projects
A fast and powerful open source alternative to grep. A javascript malware analysis tool using static analysis / deobfuscation techniques and an execution engine featuring HTML DOM emulation. Metasploit Meterpreter Script 'enum chrome'. Script to extract data from chrome browser via a meterpreter connection (the latest version is maintained in the official Metasploit repository). Metasploit Meterpreter Script 'screen unlock'. A small javascript encoder (included in the official Metasploit repository).
Publications | Relentless Coding
http://www.relentless-coding.org/publications
Circumventing Signature-Based Detection of Javascript Exploits with Forced Timeouts. The article describes the concept and technical details of the JSidle javascript packer. HITB Magazine Issue 003.
Pentest N00b: July 2010
http://pentest-n00b.blogspot.com/2010_07_01_archive.html
Thursday, 8 July 2010. Re Think On Pentest Lab - We Go Totally Open Source. Having played around with my previous Virtual Pentest Lab and found it more than up to the job, Citrix's Xenserver is after all the best Virtualisation system around and for not very much money or free if you don't need the fancy extra's - I have a 2 node Xenserver system with an OPenFiler SAN at the office without the essentials licence and it makes life sooooo easy. Give it a try and watch this space for future developments.
Pentest N00b: January 2010
http://pentest-n00b.blogspot.com/2010_01_01_archive.html
Tuesday, 5 January 2010. Having read the latest blog posts from Syn Junkie, I have decided to setup my own pentest lab. Following Syn's recommendations I have decided to to lean on virtualization to provide the basis for my lab. I too have 3 laptops, 1 x Lenovo Thinkpad Z61p running Citrix Xenserver 5.5.0. 1 x Lenovo Thinkpad X60s running Ubuntu 9.10 and KVM. 1 x ASUS EEEPC 1000HE Hackbook running Backtrack 4. I look forward to publishing my exploits with my new Pentesting lab. Subscribe to: Posts (Atom).
Pentest N00b: August 2009
http://pentest-n00b.blogspot.com/2009_08_01_archive.html
Monday, 24 August 2009. Well the past few weeks have been a little busy @ work so have not had much time to further my knowledge. I have managed to read about and try to understand how exploits are found and how the exploiter alters the application code to enable an exploit to run in an application, this was mainly utilising the buffer overflow method. There are some nice tutorials here @ Peter Van Eeckhouttes Blog. Http:/ www.corelan.be:8800/. Catch you all soon. Friday, 7 August 2009. Creating Real Loo...
TOTAL LINKS TO THIS WEBSITE
36
Release The Robots! - Release The Robots!
Release The Robots With Rock. 1 Despite common perception, Robots do not spend all their time waltzing across sunlit fields of bright colours. Unfortunately they, like humans, also spend a lot of their lives in cold grey mind prisons of their own design. And so we have come to Release The Robots! And so we have come to Release The Robots!
Releasing Heaven Ministries' Blog | Worship~Prayer~Outreach
Releasing Heaven Ministries' Blog. Worship Prayer Outreach: Taking back our cities! Make Disciples of All Nations. Come with us to Israel. Where the soles of our feet tread…. Come in King of Glory! JUNE/JULY 2015 Epicentre at Uptown Charlotte – MECKLENBURG COUNTY. August 8, 2015. In June, we more fully launched out into our County-to-County mandate from the Lord to release “A Whirlwind of Glory” through Worship and Prayer. I (Yvonne) had been joining Uptown Worship Nights. June 28, 2015. June 28, 2015.
Releasing Success Ltd.
Tuesday, 10 February 2015. Walking down Waterloo Roadagain. I admit it Waterloo Road is my guilty pleasure but I’d managed to abstain for a couple of years until I succumbed again last night. Yet again the educational technology issues came thick and fast good product placement from Promethean continues! Bonnie Kincaid: Victim of Cyber-bullying. Given that the show aired the day before Safer Internet Day you could praise the writers for tackling these themes but then. That plot device enabled the headtea...
blog.relectric.com
Sponsored results for circuit breakers. Circuit Breakers at All Breakers Inc. Circuit breaker - we ship same day. All major manufacturers in stock. Buy online or call in - our technical sales team is standing by to assist you. Howstuffworks "How Circuit Breakers Work". The circuit breaker is one of the most important safety mechanisms in your home. Without it, the risk of fire would skyrocket. Learn how a circuit breaker. Shop for Brand New Circuit Breakers. Tired of failed breakers?
The Relenta CRM blog
Subscribe to Our Newsletter. The Relenta CRM blog. We are very good at what we do! We’ve created a special product that’s easy to use without sacrificing performance…. Announcing 3 new features to beef up your email marketing. Today’s update beefs up your email marketing automation capabilities with these new features: “Fixed Date” email autoresponders Improved subscription management…. Simple to use, easy to succeed. Announcing New item selector, group handling and more. Smart work pays off! Here’...
Relentless Coding
So much to code, so little time . Tuesday, January 14, 2014. JSDetox 0.2 released. I commited some changes to JSDetox last december, fixing some bugs and introducing new features. The following bugs are now fixed:. Handling of anonymous function calls (see Issue #7. Upload of files containing UTF-8 characters (see Issue #9. Handling of Prefix/Postfix Operators (like "i ") in static analysis (thanks to Jackmcbarn). Appart from the bug fixes, the following improvements/features got implemented:. Executed&#...
Relentless365.com
This domain is for sale. Click here for more information. Jason Aldean Music Video. Jason Aldean Music Video.
The Relevancy Group Blog – Access to Answers
The Relevancy Group Blog. Email Marketing Mobile Readiness in 2018. February 8, 2018. February 8, 2018. How Mobile Ready is Your Email Marketing Program? Download the research for free with registration. Enjoy the on-demand webinar Email Marketing Mobile Readiness in 2018. What consumer behavior trends should influence email marketing mobile strategies? How are marketers utilizing mobile apps and what is necessary to optimize that experience? The Research: 18 pages, 7 Charts, 4,241 words. Sponsored b...
Relevant Ministry Blog
To receive blog post updates in your inbox. To the RSS feed . Thursday, December 11, 2014. Why does it have to be so hard? As my “I-don’t-do-mornings” and “I-don’t-love-school tween”. And I were racing to school one morning she moaned, “Why does school have to be so hard? Isn’t all of life similar to this? As I look back over my life, I can see God leading me down dark and seemingly desolate paths. Those times were scary and full of new challenges (or opportunities depending on how you look at it). A few...
RelevantNow
Back To The Website. Back To The Website. At The House of Lords with Professor Lord Robert Winston for the Genesis Research Trust. May 31, 2016. Laura and I were so inspired by Professor Lord Robert Winston and the amazing cyclists at the Genesis Research Trust. Event at The House of Lords on May 19th 2016. We were so grateful to receive the invitation and are delighted that RelevantNow has been able to help promote these important issues. The ‘Nicest Man In Britain’ Recommends RelevantNow! May 29, 2016.
SOCIAL ENGAGEMENT