Archive for the ‘Reverse Engineering’ Category

FaceTime Protocol Analysis

My good friend, fellow SANS instructor, sushi lover, colleague and boss, Mike Poor, has started a blog about packets over at www.packetstan.com.  I’ve been working on the site and have posted a 3-part series of articles assessing the Apple FaceTime protocol.  Stop by and take a look. -Josh

July 9, 2010   Posted in: Apple, iPhone, Reverse Engineering, Wireless  No Comments

Reversing the Microchip Zena ZigBee Sniffer

A few days ago I bought a Microchip Zena ZigBee sniffer. This USB HID device comes with simple software for Windows that captures and decodes 2.4 GHz 802.15.4, ZigBee, MiWi (Microchip stack) and MiWi-P2P traffic. It’s $150, which is a little steep considering that it is a PIC18LF with USB and a MRF24J40 radio, but [...]

May 10, 2009   Posted in: Hardware, Linux, Reverse Engineering, ZigBee  8 Comments

Follow the Bouncing Malware: Gone With the WINS

Tom Liston is a unique individual. Not only is he technically skilled in many areas, but he has the Kurt Vonnegut gift of being able to write a story that both delivers a message and keeps you entertained with simple sentences (oh, and teaches you a thing or two about malware analysis). Follow the Bouncing [...]

May 7, 2009   Posted in: Exploit, Malware, Reverse Engineering, Security, Windows 2003  No Comments