gl2gb/public/categories/cyber/index.xml

93 lines
6.1 KiB
XML

<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>cyber on GoatPr0n.farm</title>
<link>https://goatpr0n.farm/categories/cyber/</link>
<description>Recent content in cyber on GoatPr0n.farm</description>
<generator>Hugo -- gohugo.io</generator>
<language>en</language>
<lastBuildDate>Wed, 25 Sep 2019 15:22:58 +0000</lastBuildDate>
<atom:link href="https://goatpr0n.farm/categories/cyber/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Initial flashing/debricking the Proxmark V3 EASY (w/ Bus Pirate)</title>
<link>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</link>
<pubDate>Wed, 25 Sep 2019 15:22:58 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</guid>
<description>TL;DR; Short the ERASE pin with VDDCORE, if ERASE == PIN_55 &amp;amp;&amp;amp; VDDCORE == PIN_54
According to complains in the internet, users report bricking their Proxmark3 EASY, when they try to flash the latest firmware with the &amp;lsquo;flasher&amp;rsquo; software tool.
Sometimes flashing process of firmware can go wrong, but it can often be recovered with JTAG programmers, or similar programmers.
I will not about setting up the environment to build, and flash the firmware, but I will tell you what you might be missing out and why it might be not working.</description>
</item>
<item>
<title>Google CTF 2019 - FriendSpaceBookPlusAllAccessRedPremium.com</title>
<link>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</link>
<pubDate>Wed, 24 Jul 2019 12:19:47 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</guid>
<description>#MemeFreeEdition
The Challenge You are provided a zip file containing two files.
program vm.py The file program contains instructions encoded as emojis for a virtual machine called vm.py. At the bottom of vm.py I found a list, or lets call it a translation table, with emojis and their function name counter part.
OPERATIONS = { &amp;#39;🍡&amp;#39;: add, &amp;#39;🤡&amp;#39;: clone, &amp;#39;📐&amp;#39;: divide, &amp;#39;😲&amp;#39;: if_zero, &amp;#39;😄&amp;#39;: if_not_zero, &amp;#39;🏀&amp;#39;: jump_to, &amp;#39;🚛&amp;#39;: load, &amp;#39;📬&amp;#39;: modulo, &amp;#39;⭐&amp;#39;: multiply, &amp;#39;🍿&amp;#39;: pop, &amp;#39;📤&amp;#39;: pop_out, &amp;#39;🎤&amp;#39;: print_top, &amp;#39;📥&amp;#39;: push, &amp;#39;🔪&amp;#39;: sub, &amp;#39;🌓&amp;#39;: xor, &amp;#39;⛰&amp;#39;: jump_top, &amp;#39;⌛&amp;#39;: exit } To execute program with vm.</description>
</item>
<item>
<title>[Teaser] How to reverse engineer communication protocols of embedded devices</title>
<link>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</link>
<pubDate>Sat, 16 Feb 2019 01:25:34 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</guid>
<description>Sneak Preview These letters. Such announcement. Many words.
In the next few days I will publish two - not one - but two articles on how to approach a problem on how to reverse engineer protocols. There have been to applications I looked into to code a library for my home uses.
#1 - MC3000 Charger MC3000_Charger provides an USB and Bluetooth (BT) interface (Spoiler: I am not covering the BT interface.</description>
</item>
<item>
<title>Hack back during #cyberwar</title>
<link>https://goatpr0n.farm/25.html</link>
<pubDate>Tue, 05 Feb 2019 18:45:08 +0000</pubDate>
<guid>https://goatpr0n.farm/25.html</guid>
<description>According this article people want us to hack back, and the government is like:
The GIF is probably copyrighted material by the The Fine Brothers. Plz Don&amp;rsquo;t sue me. I no make cyber moneyz with this blog
KTHXBYE.</description>
</item>
<item>
<title>Can I haz ur dataz</title>
<link>https://goatpr0n.farm/posts/can-i-haz-ur-dataz/</link>
<pubDate>Fri, 01 Feb 2019 09:55:07 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/can-i-haz-ur-dataz/</guid>
<description>Remote data acquisitions over ssh To get your data trough ssh to your local storage, you simply use pipes. It does not matter if you use cat, dd or any other command line tool which outputs the data on standard output (stdout).
Using cat When using cat the there is no need to add any additional parameters in your command chain. A simple cat &amp;lt;input&amp;gt; will suffice.
Cat does not have any progress information during read operations.</description>
</item>
<item>
<title>What if the cult of dd is right?</title>
<link>https://goatpr0n.farm/posts/what-if-the-cult-of-dd-is-right/</link>
<pubDate>Wed, 23 Jan 2019 00:47:15 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/what-if-the-cult-of-dd-is-right/</guid>
<description>Are you a believer? There are articles out there talking about the useless usage of dd and why cat is better. Cat is faster because it automatically adjusts the blocksize and dd is slow because it internally only works with 512 byte blocks. This and That.
I did some simple tests with time, dd and cat, added some obscure parameters to dd, because cat is better.
Testing dd with status and specific blocksize $ time dd if=/dev/sdd of=test.</description>
</item>
<item>
<title>There is not enough cyber in the world</title>
<link>https://goatpr0n.farm/posts/there-is-not-enough-cyber-in-the-world/</link>
<pubDate>Mon, 21 Jan 2019 15:21:23 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/there-is-not-enough-cyber-in-the-world/</guid>
<description>My recent favuorite hash tags in social networks are:
- cyberwar / cyberkrieg - cold-cyberwar / kalter cyberkrieg KTHXBYE</description>
</item>
</channel>
</rss>