x86

HALT! I am Reptar! Intel CPU Bug Panics Cloud Providers
Richi Jennings | | Cloud, Cloud IaaS, cpu, CPU attack, CPU flaw, CPU microcode, cpu vulnerability, Denial of Service, denial-of-service attack, DoS, IaaS, IaaS Security, Infrastructure as a Service (IaaS), Intel, Intel CPU, INTEL-SA-00950, Microcode Flaws, Redundant Prefix Issue, Reptar, SB Blogwatch, x86, x86_64
IaaS Catch Fire: Google and Intel fuzz, find and fix a fabulous bug. Next up: More of the same ...
Security Boulevard

Linux X86 Assembly – How To Test Custom Shellcode Using a C Payload Tester
Travis Phillips | | ALSR, analysis, Application Security, architecture, ASM, cpu, debugging, DEP, function, gas, getpagesize, Hello World, Linux, mprotect, payload, Penetration Testing, pointers, Professionally Evil, programming, Reverse Engineering, Secure Ideas, shellcode, stub, syscalls, testing, training, x86
Overview In the last blog post in this series, we created a tool to make it easy to build our custom payloads and extract them. However, what if we want to test ...

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload
Travis Phillips | | analysis, Application Security, architecture, ASM, call, cpu, exit, gas, Hello World, int, jmp, Linux, mov, objdump, optimize, payload, Penetration Testing, PoP, Professionally Evil, programming, push, Registers, Reverse Engineering, Secure Ideas, shellcode, syscalls, training, write, x86, xchg, xor
Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly. While this can help us learn x86 assembly, it isn’t viable as a ...

Linux X86 Assembly – How to Build a Hello World Program in NASM
Travis Phillips | | analysis, Application Security, architecture, ASM, C++, cpu, exit, Hello World, int, Linux, mov, NASM, payload, Penetration Testing, Professionally Evil, programming, Registers, Reverse Engineering, Secure Ideas, shellcode, syscalls, write, x86
Overview A processor understands bytecode instructions specific to that architecture. We as humans use mnemonics to make building these instructions easier than remembering a bunch of binary codes. These mnemonics are known ...

A Hacker’s Tour of the X86 CPU Architecture
Travis Phillips | | analysis, Apple, architecture, ARM, cpu, eflags, Endian, M1, payload, Penetration Testing, Professionally Evil, Registers, Reverse Engineering, Reviews, Secure Ideas, segments, shellcode, x86
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers. While other architectures exist and are even taking some market share with mobile ...

Scientists claim to have invented the unhackable processor
Filip Truta | | cpu, Industry News, iot, Michigan, processor, scientists, unhackable, university of michigan, x86
An intriguing paper published by researchers at the University of Michigan describes a new processor architecture capable of self-encryption that can fend off any hacks. A DARPA-supported project, the new chip design ...