gl2gb/public/posts/index.xml

126 lines
8.3 KiB
XML

<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Blog on GoatPr0n.farm</title>
<link>https://goatpr0n.farm/posts/</link>
<description>Recent content in Blog on GoatPr0n.farm</description>
<generator>Hugo -- gohugo.io</generator>
<language>en</language>
<lastBuildDate>Thu, 28 Nov 2019 12:01:53 +0000</lastBuildDate>
<atom:link href="https://goatpr0n.farm/posts/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reverse Engineering of a Flash Programmer :: EZP2010</title>
<link>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</link>
<pubDate>Thu, 28 Nov 2019 12:01:53 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</guid>
<description>Preface In today&amp;rsquo;s adventure I like to take you with me on my journey of reverse engineering another USB device. The EZP2010 is an USB programmer for flash memory as used by mainboard manufactures to store the BIOS, or embedded devices to store the firmware (or settings). When it comes to data recovery on hard drives, or similar storage devices, these flashers can also become handy.
EZP2010 USB-Highspeed programmer
This particular programmer can be bought on many Chinese store or Amazon.</description>
</item>
<item>
<title>Initial flashing/debricking the Proxmark V3 EASY (w/ Bus Pirate)</title>
<link>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</link>
<pubDate>Wed, 25 Sep 2019 15:22:58 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/initial-flashing-debricking-the-proxmark-v3-easy-w-bus-pirate/</guid>
<description>TL;DR; Short the ERASE pin with VDDCORE, if ERASE == PIN_55 &amp;amp;&amp;amp; VDDCORE == PIN_54
According to complains in the internet, users report bricking their Proxmark3 EASY, when they try to flash the latest firmware with the &amp;lsquo;flasher&amp;rsquo; software tool.
Sometimes flashing process of firmware can go wrong, but it can often be recovered with JTAG programmers, or similar programmers.
I will not about setting up the environment to build, and flash the firmware, but I will tell you what you might be missing out and why it might be not working.</description>
</item>
<item>
<title>Google CTF 2019 - FriendSpaceBookPlusAllAccessRedPremium.com</title>
<link>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</link>
<pubDate>Wed, 24 Jul 2019 12:19:47 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/google-ctf-2019-friendspacebookplusallaccessredpremium-com/</guid>
<description>#MemeFreeEdition
The Challenge You are provided a zip file containing two files.
program vm.py The file program contains instructions encoded as emojis for a virtual machine called vm.py. At the bottom of vm.py I found a list, or lets call it a translation table, with emojis and their function name counter part.
OPERATIONS = { &amp;#39;🍡&amp;#39;: add, &amp;#39;🤡&amp;#39;: clone, &amp;#39;📐&amp;#39;: divide, &amp;#39;😲&amp;#39;: if_zero, &amp;#39;😄&amp;#39;: if_not_zero, &amp;#39;🏀&amp;#39;: jump_to, &amp;#39;🚛&amp;#39;: load, &amp;#39;📬&amp;#39;: modulo, &amp;#39;⭐&amp;#39;: multiply, &amp;#39;🍿&amp;#39;: pop, &amp;#39;📤&amp;#39;: pop_out, &amp;#39;🎤&amp;#39;: print_top, &amp;#39;📥&amp;#39;: push, &amp;#39;🔪&amp;#39;: sub, &amp;#39;🌓&amp;#39;: xor, &amp;#39;⛰&amp;#39;: jump_top, &amp;#39;⌛&amp;#39;: exit } To execute program with vm.</description>
</item>
<item>
<title>Reverse Engineering of the SkyRC MC3000 Battery Charger USB Protocol</title>
<link>https://goatpr0n.farm/posts/reverse-engineering-of-the-skyrc-mc3000-battery-charger-usb-protocol/</link>
<pubDate>Mon, 18 Mar 2019 16:49:39 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/reverse-engineering-of-the-skyrc-mc3000-battery-charger-usb-protocol/</guid>
<description>Software Requirements Decompiler for .NET programs
dotPeek The implementation of the protocol is then written in Python. Let&amp;rsquo;s hear what the curator has to say:
Tell me about Python.
&amp;gt; Wow. Much Snake. Easy programming! &amp;gt; &amp;gt; \- Doge Tell me about dotPeek.
&amp;gt; Easy decompilation. Readable syntax. Very easy. &amp;gt; &amp;gt; \- Doge Analyzing MC3000_Monitor Decompiling Start dotPeek and use Drag&amp;rsquo;n&amp;rsquo;Drop to load the Application. Or uSe CtRL+O anD LoCATe tHe fILe uSiNg ThE bOrwsEr.</description>
</item>
<item>
<title>[Teaser] How to reverse engineer communication protocols of embedded devices</title>
<link>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</link>
<pubDate>Sat, 16 Feb 2019 01:25:34 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/teaser-how-to-reverse-engineer-communication-protocols-of-embedded-devices/</guid>
<description>Sneak Preview These letters. Such announcement. Many words.
In the next few days I will publish two - not one - but two articles on how to approach a problem on how to reverse engineer protocols. There have been to applications I looked into to code a library for my home uses.
#1 - MC3000 Charger MC3000_Charger provides an USB and Bluetooth (BT) interface (Spoiler: I am not covering the BT interface.</description>
</item>
<item>
<title>Hack back during #cyberwar</title>
<link>https://goatpr0n.farm/25.html</link>
<pubDate>Tue, 05 Feb 2019 18:45:08 +0000</pubDate>
<guid>https://goatpr0n.farm/25.html</guid>
<description>According this article people want us to hack back, and the government is like:
The GIF is probably copyrighted material by the The Fine Brothers. Plz Don&amp;rsquo;t sue me. I no make cyber moneyz with this blog
KTHXBYE.</description>
</item>
<item>
<title>Welcome to the farm!</title>
<link>https://goatpr0n.farm/posts/welcome-to-the-farm/</link>
<pubDate>Tue, 05 Feb 2019 18:17:12 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/welcome-to-the-farm/</guid>
<description>This magnificent piece of blog is now available under https://goatpr0n.farm/. Marvelous!</description>
</item>
<item>
<title>Can I haz ur dataz</title>
<link>https://goatpr0n.farm/posts/can-i-haz-ur-dataz/</link>
<pubDate>Fri, 01 Feb 2019 09:55:07 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/can-i-haz-ur-dataz/</guid>
<description>Remote data acquisitions over ssh To get your data trough ssh to your local storage, you simply use pipes. It does not matter if you use cat, dd or any other command line tool which outputs the data on standard output (stdout).
Using cat When using cat the there is no need to add any additional parameters in your command chain. A simple cat &amp;lt;input&amp;gt; will suffice.
Cat does not have any progress information during read operations.</description>
</item>
<item>
<title>What if the cult of dd is right?</title>
<link>https://goatpr0n.farm/posts/what-if-the-cult-of-dd-is-right/</link>
<pubDate>Wed, 23 Jan 2019 00:47:15 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/what-if-the-cult-of-dd-is-right/</guid>
<description>Are you a believer? There are articles out there talking about the useless usage of dd and why cat is better. Cat is faster because it automatically adjusts the blocksize and dd is slow because it internally only works with 512 byte blocks. This and That.
I did some simple tests with time, dd and cat, added some obscure parameters to dd, because cat is better.
Testing dd with status and specific blocksize $ time dd if=/dev/sdd of=test.</description>
</item>
<item>
<title>There is not enough cyber in the world</title>
<link>https://goatpr0n.farm/posts/there-is-not-enough-cyber-in-the-world/</link>
<pubDate>Mon, 21 Jan 2019 15:21:23 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/there-is-not-enough-cyber-in-the-world/</guid>
<description>My recent favuorite hash tags in social networks are:
- cyberwar / cyberkrieg - cold-cyberwar / kalter cyberkrieg KTHXBYE</description>
</item>
</channel>
</rss>