Reversing C++, Qt based applications using Ghidra
This post is going to be too ambitious probably: I want to introduce you to
C++ code, applying this knowledge in particular to
applications and since we are at it, explaining some
ghidra scripting to
automate the process.
side channels: power analysis
side channels: using the chipwhisperer
This is a post in a series regarding side channels, from the theoretical and pratical point of view; the posts are
- introduction on the model of computing devices (to be finished)
- using the Chipwhisperer (this post)
- power analysis (here)
- glitching (to be finished)
Reusing old shit: laptop keyboard
Here we are with another experiment in reusing otherwise trash-destined electronics material; in this episode we are going to refurbish a keyboard, from the recovering of the internal "matrix" to the design of the PCB destined as the controller board, to finally reworking of an existing firmware to create a new USB keyboard.
blog migration to Nikola
After running for a couple of years using
jekill as a static site generator
I decided to switch to
nikola for a couple of reasons: first of all because
is implemented in
python, a language that I know more than
ruby and this
allows me to improve the platform and customize it more to suite my needs.
Reusing old shit: creating a BSP using Yocto for the Samsung Galaxy S (S5PV210)
In this post I'll describe my esperiments in reusing my old Samsung Galaxy S; don't expected anything sophisticated, it's more a brain dump.
Reusing old shit: lcd screen
It's happened in the past that someone gifted me of very old (and not working anymore) laptops that otherwise would have been thrown in the garbage; my idea for them was of reusing some parts that are more valuable: battery, disks, keyboards, etc...
Modern cryptography: exercises chapter 3 'Private-key encryption'
These are some solved exercises of chapter 3 of the book "Introduction to modern cryptography" (second edition) by Jonathan Katz and Yehuda Lindell. For chapter 2 go here.
In this post I want to add some pratical notes (and maybe a new tool) to the paper from saelo about exploiting modern browsers; in particular I'll focus on Webkit and as in his paper, I'll deep dive into the source code of that version of webkit.
Configuring an IpSec VPN (fortigate client)
I was in need to have a working VPN with Fortigate and here I'm going to recollect the procedure that has permited to accomplish such simple but incredibly complex task.