Fixing your RockBand 2 Drum


Nov 2, 2010

You may be aware of my work on RockBand 2 Drum "drivers". If I had written my code as a kernel module (and it would likely be accepted into the mainline), it would be easy to call it a driver. However, I wrote it using libusb and ALSA, which makes it a userland program. I feel that I made the right design choice. ALSA libraries are low enough latency and libusb allows efficient use of interrupts, so it works quite well. Also, adding any complex code to the kernel that isn't totally necessary seems like a risky endeavor.

Anyway, that code is here: RockBand 2 Drum Instrument for Linux

Read more »

Reversing HP M30x Camera Firmware


Oct 10, 2010 10:43 am

No files officially released yet. See below.

Firmware hacking is an impressively difficult yet rewarding task. Most people are afraid of it because it depends on reversing binaries for embedded architectures that do not have good tools. Many tools that do exist are expensive and have a high learning curve even for experts in the field. Firmware hacking is actually a fun and simple process if you know what you're looking for. Projects for cell phones, video game consoles, and calculators are often out of the league of amateurs until the initial work is done. After the system has been successfully hacked, the code (if made available as open source) can be modified by anyone to improve the software.

Read more »

Sudo and Su Considered Harmful, Sudo/Su Bruteforce Utility


Aug 10, 2010

Sudo and Su Bruteforce 0.1 [sig]

INTRODUCTION

Two years ago I noticed that su and sudo both contain a fatal flaw: administrator passwords. Administrator passwords have found themselves at the core of our security. OpenSSH does not allow root to login by default because on rare occasion administrator passwords can be bruteforced. Nearly all Linux and BSD systems recognize this. Some system administrators still don't recognize this due to business constraints. Users that have insecure passwords can be bruteforced if an attacker knows their name. The common system of first letter and last name or handle as the username gives an attacker a good list of users to bruteforce. How many administrators use the username jsmith? How many administrators use the username admin? Su and sudo may be considered harmful if we consider that usernames can be learned and that passwords can be bruteforced.

Removing the password component, we can compare sudo and su to the Windows Vista and Windows 7 administrator access security model: give a user administrator access when they ask for it. This person must be designated as an administrator by the original owner of the system. This seems obvious and tautological but we have yet to introduce an attacker with two different methods of attack.

Read more »

Sixteen Good Reasons To Love Xor ⊕


July 18, 2010

Xor is a binary operation that is versatile and not easily replaced. It represents a logical truth that is effective and seductive. Today I will give sixteen good reasons to love xor. If you are a computer scientist, programmer, or hacker and you don't use xor from time to time, you are doing something wrong.

Read more »

« previous next »