PoC||GTFO

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Manul Laphroaig
Series: PoC||GTFO 1
Publisher: No Starch Press
Year: 2017

Language: English
Pages: 792

Introduction......Page 13
Let us begin!......Page 17
iPod Antiforensicsby Travis Goodspeed......Page 19
ELFs are dorky, Elves are coolby S. Bratus and J. Bangert......Page 24
Epistle to Hats of All Colorsby Manul Laphroaig......Page 33
Returning from ELF to Libcby Rebecca .Bx Shapiro......Page 36
GTFO or #FAILby FX of Phenoelit......Page 39
Lend me your ears!......Page 41
RNG in four lines of Javascriptby Dan Kaminsky......Page 43
Serena Butler's TV Typewriterby Travis Goodspeed......Page 51
Making a Multi-Windows PEby Ange Albertini......Page 62
This ZIP is also a PDFby Julia Wolf......Page 66
Burning a Phoneby Josh Thomas......Page 69
Sermon on the Divinity of Languagesby Manul Laphroaig......Page 73
Ring them Bells!......Page 77
Build your own birdfeeder.by Manul Laphroaig......Page 80
A PGP Matryoshka Dollby Myron Aub......Page 84
Code Execution on a Tamagotchiby Natalie Silvanovich......Page 87
Shellcode for MSP430by Travis Goodspeed......Page 92
Calling putchar() from ELFby Rebecca .Bx Shapiro......Page 100
POKE of Death for the TRS 80/M100by Dave Weinstein......Page 110
This OS is also a PDFby Ange Albertini......Page 113
A Vulnerability in Reduced Dakarandby Joernchen......Page 119
Juggernautyby Ben Nagy......Page 129
Fear Not!......Page 133
Greybeard's Luckby Manul Laphroaig......Page 137
This PDF is a JPEG.by Ange Albertini......Page 144
Netwatch for SMMby Wise and Potter......Page 147
Packet-in-Packet Mitigation Bypassby Travis Goodspeed......Page 154
An RDRAND Backdoor in Bochsby Taylor Hornby......Page 163
Kosher Firmware for the Nokia 2720by Assaf Nativ......Page 170
Tetranglix Boot Sectorby Haverinen, Shepherd, and Sethi......Page 186
Defusing the Qualcomm Dragonby Josh Thomas......Page 191
Tales of Python's Encodingby Frederik Braun......Page 195
Angecryptionby Albertini and Aumasson......Page 199
Let me tell you a story.......Page 207
Epistle on the Bountiful Seeds of 0Dayby Manul Laphroaig......Page 210
This OS is a Boot Sectorby Shikhin Sethi......Page 212
Prince of PoCby Peter Ferrie......Page 225
New Facedancer Frameworkby Gil......Page 234
Power Glitching Tamagotchiby Natalie Silvanovich......Page 242
A Plausibly Deniable Cryptosystemby Evan Sultanik......Page 249
Hardening Pin Tumbler Locksby Deviant Ollam......Page 260
Intro to Chip Decapsulationby Travis Goodspeed......Page 269
Forget Not the Humble Timing Attackby Colin O'Flynn......Page 281
This Truecrypt is a PDFby Ange Albertini......Page 290
How to Manually Attach a File to a PDFby Albertini......Page 294
Ode to ECBby Ben Nagy......Page 298
It started like this.......Page 301
A Sermon on Hacker Privilege.by Manul Laphroaig......Page 305
ECB: Electronic Coloring Bookby Philippe Teuwen......Page 310
An Easter Egg in PCI Expressby Jacob Torrey......Page 319
A Flash PDF Polyglotby Alex Inführ......Page 326
This Multiprocessing OS is a Boot Sectorby Shikhin Sethi......Page 330
A Breakout Board for Mini-PCIeby Joe FitzPatrick......Page 342
Prototyping a generic x86 backdoor in Bochsby Matilda......Page 350
Your Cisco blade is booting PoC"026B30D GTFO.by Mik......Page 364
I am my own NOP Sled.by Brainsmoke......Page 374
Abusing JSONP with Rosetta Flashby Michele Spagnuolo......Page 379
Sexy collision PoCsby A. Albertini and M. Eichlseder......Page 390
Ancestral Voicesby Ben Nagy......Page 402
Communion with the Weird Machines......Page 405
On Giving Thanksby Manul Laphroaig......Page 408
Gekko the Dolphinby Fiora......Page 414
This TAR archive is a PDF!by Ange Albertini......Page 434
x86 Alchemy and Smugglingby Micah Elizabeth Scott......Page 438
Detecting MIPS Emulationby Craig Heffner......Page 454
More Cryptographic Coloring Booksby Philippe Teuwen......Page 462
PCB Reverse Engineeringby Joe Grand......Page 475
Davinci Sealby Ryan O'Neill......Page 484
Observable Metricsby Don A. Bailey......Page 499
With what shall we commune this evening?......Page 515
The Magic Number: 0xAA55by Morgan Reece......Page 518
Coastermeltby Micah Elizabeth Scott......Page 520
The Lysenko Sermonby Manul Laphroaig......Page 529
When Scapy is too high-levelby Eric Davisson......Page 536
Abusing file formatsby Ange Albertini......Page 545
AES-NI Backdoorsby BSDaemon and Pirata......Page 589
Innovations with Linux core files.by Ryan O'Neill......Page 602
Bambaata speaks from the past.by Count Bambaata......Page 616
Cyber Criminal's Songby Ben Nagy......Page 624
Please stand; now, please be seated.......Page 627
Witches, Warlocks, and Wassenaarby Manul Laphroaig......Page 630
Compiler Bug Backdoorsby Bauer, Cuoq, and Regehr......Page 635
A Protocol for Leibowitzby Goodspeed and Muur......Page 643
Jiggling into a New Attack Vectorby Mickey Shkatov......Page 663
Hypervisor Exploit, Five Years Oldby DJC and Bittman......Page 671
Stegosploitby Saumil Shah......Page 677
On Error Resume Nextby Jeffball......Page 718
Unbrick My Partby Tommy Brixton......Page 722
Backdoors up my Sleeveby JP Aumasson......Page 724
Naughty Signalsby Russell Handorf......Page 735
Weird Cryptoby Philippe Teuwen......Page 744
Index......Page 752
Colophon......Page 792