16:09 Obfuscation via Symbolic Regression by JBS. 16:08 Naming Network Interfaces by Cornelius Diekmann.
16:07 Executing Unmapped Thumb by Maribel Hearn. 16:06 Fragmented Chunks by Yannay Livneh. 393Ĭontents 16:04 Wafer Thin Locks by Deviant Ollam. 388 16:03 Emulating my Chevy by Brandon L. Laphroaig Races the Runtime Relinker 385 16:02 Sapere aude! by Manul Laphroaig. 15:13 The PNG Gamma Trick by Hector Martin. 15:12 Java Key Store’s Coffin by Tobias “Floyd” Ospelt. 15:11 x86 without Data Fetches by Chris Domas. 15:10 Tracing Race Conditions by BSDaemon and NadavCh. 15:09 Detecting MIPS16 Emulation by Goodspeed and Speers. 15:08 Zero Overhead Networking by Robert Graham.
15:07 A PDF that is a Git Repo by Evan Sultanik. 15:06 Cracking Gumball by 4am and Peter Ferrie. 15:03 The Alternator Sermon by Manul Laphroaig. 15:02 Pier Solar and the Great Reverser by Brandon L. 138Ĭontents I slipped a little, but Laphroaig was there. 14:12 MD5 NES Polyglot by Evan Sultanik and Evan Teran. 14:11 A GIF shows its own MD5! by Kristoffer Janke. 14:10 A PDF That Shows Its Own MD5 by Mako. 14:09 Hash Function Pseudo-Fixpoints by Greg Kopf. 14:08 Control Panel Vulnerabilities by Geoff Chappell. 14:07 Ethernet Over GDB by Micah Elizabeth Scott. 14:06 Random NOPs in ARM by Timmers and Spruyt. 14:05 Anti-Keylogging with Noise by Mike Myers. 14:04 Texting with Flush+Reload by Taylor Hornby. 14:03 Concerning Desert Studies by Manul Laphroaig. Laphroaig screams high five to the heavens! 14:02 Z-Ring Phreaking by Vicki Pfau. Manul Laphroaig Melilot Evan Sultanik Jacob Torrey Ange Albertini Philippe Teuwen Ryan Speers Nick Farr
Editor of Last Resort TEXnician Editorial Whipping Boy Funky File Supervisor Assistant Scenic Designer Scooby Bus Driver Samizdat Postmaster Euclid’s postulates came from the Pythagorean theorem, not the other way around. If the Pythagorean theorem were found to not follow from the postulates, we would again search for a way to alter the postulates until it was true. The idea that theorems follow from the postulates does not correspond to simple observation. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.
While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. The information in this book is distributed on an “As Is” basis, without warranty. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Other product and company names mentioned herein may be the trademarks of their respective owners. 245 8th Street, San Francisco, CA 94103 phone: 1.415.863.9900 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. ISBN-10: 1-7185-0064-5 ISBN-13: 978-1-7185-0064-8 For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. Printed in India First printing 24 23 22 21 20
Feel free to photocopy these articles for classroom use, or just to do your part in the самиздат tradition. While you are more than welcome to copy pieces of this book and distribute it electronically, only No Starch Press may produce this printed compilation commercially. SHA-1 Collisions with PDFLaTeXby Ange Albertini Reversing DDR3 Scramblingby Nico Heijningen Remotely Exploiting Tetrinetby Laky and Hanslovan
Read Only Relocations for Static ELFby Ryan O'Neill
Murder on the USS Tableby Soldier of FortranĪn 8 Kilobyte Mode 7 Demoby Vincent WeaverĮxploits for Kids with Scratch!by Kev SheldrakeĬoncealing ZIP Files in NES Cartridgesby Vi Grey Injecting Shared Objects on FreeBSDby Shawn Webb Sniffing BTLE with the Micro:Bitby Damien Cauquil It's damned cold outside, so let's light ourselves a fire! This PDF Reverse Engineers Itselfby Evan Sultanik Stack Return Addresses from Canariesby Matt Davis Obfuscation via Symbolic Regressionby JBS Naming Network Interfacesby Cornelius Diekmann Java Key Store's Coffinby Tobias ``Floyd'' Ospelt Tracing Race Conditionsby BSDaemon and NadavCh Wilsonĭetecting MIPS16 Emulationby Goodspeed and Speers Pier Solar and the Great Reverserby Brandon L. I slipped a little, but Laphroaig was there. MD5 NES Polyglotby Evan Sultanik and Evan Teran Hash Function Pseudo-Fixpointsby Greg KopfĪ GIF shows its own MD5!by Kristoffer Janke Texting with Flush+Reloadby Taylor HornbyĮthernet Over GDBby Micah Elizabeth ScottĬontrol Panel Vulnerabilitiesby Geoff Chappell Laphroaig screams high five to the heavens!Ĭoncerning Desert Studiesby Manul Laphroaig