ShadowBrokers Leak: A Machine Learning Approach

During the past few weeks I read a lot of great papers, blog posts and full magazine articles on the ShadowBrokers Leak (free public repositories: here and here) released by WikiLeaks Vault7.  Many of them described the amazing power of such a tools (by the way they are currently used by hackers to exploit systems […]

Read more "ShadowBrokers Leak: A Machine Learning Approach"

Malware Training Sets: A machine learning dataset for everyone

One of the most challenging tasks during Machine Learning processing is to define a great training (and possible dynamic) dataset. Assuming a well known learning algorithm and a periodic learning supervised process what you need is a classified dataset to best train your machine. Thousands of training datasets are available out there from “flowers” to […]

Read more "Malware Training Sets: A machine learning dataset for everyone"

Internet of Broken Things: Threats are changing, so are we ?

Hi Folks, this is another blog-post on internet of “broken things”. As many of you are familiar with MQTT is one of the most used protocol over the Internet of Things. It’s widely used in private area network – to make communications quick and light – and on public network as well – to build […]

Read more "Internet of Broken Things: Threats are changing, so are we ?"

Summing up the ShadowBrokers Leak

Nowadays it’s almost impossible to not write about EquationGroup Leak, so I’m going to start my “blog post” pushing the following picture (realised by Kaspersky Lab) which would cut-out every doubts about the leak paternity. EquationGroup VS ShadowBrokers’s Leak The leaked dump contains a set of exploits, implants and tools for hacking firewalls (code name: […]

Read more "Summing up the ShadowBrokers Leak"

From ROP to LOP bypassing Control FLow Enforcement

Once upon a time breaking the Stack (here) was a metter of indexes and executables memory areas (here). Then it came a DEP protection (here) which disabled a particular area from being executable. This is the fantastic story of ROP (Return Oriented Programming) from which I’ve been working for long time in writing exploiting and […]

Read more "From ROP to LOP bypassing Control FLow Enforcement"