schadnfreude
Posted by scriptjunkie in Uncategorized on November 5, 2021
You’ll be happy when they can’t spy on you. 🔒 🕵 👨👩👧👦 📞 🎥 📂 🖧 🛡 Schadnfreude is a new end-to-end encrypted, anonymous ID and IP-hiding, decentralized, audio/video/file sharing/offline messaging multi-device platform built for both communications and application security and performance. What does all that mean? Well what if you didn’t just hope your […]
Covert credit calculation communications
Posted by scriptjunkie in Uncategorized on September 7, 2021
Record numbers of people have been in the market for a house this past year. Now working at home, I also bought a house, with an office. Finding one in this market was frenzied, but I spent as much time trying to figure out the best financing arrangement as picking the house. Every mortgage calculator […]
Moving Off Google
Posted by scriptjunkie in Uncategorized on February 26, 2021
Not long ago, a well-known games developer posted the following horror story: I have used and been burned by a number of Google services over the years but certainly didn’t think that attitude would extend to GMail. Yet it apparently has, and even to high profile users, which I am not. I’m also a bit […]
rustun – Virtual Not Private Network in 100 Rust lines
Posted by scriptjunkie in Uncategorized on April 1, 2020
While stuck at home I wrote a simple Linux tunnel (“VPN” but not encrypted/authenticated) in 100 lines of Rust. This is a PoC, not an OpenVPN replacement; just sending the IP layers and above over UDP. Specifically, it creates a tun device, enables the device, sets the device’s IP and netmask, and forwards packets in […]
Stream Securely: Simply and Privately Preserving Live Video Evidence
Posted by scriptjunkie in Uncategorized on February 25, 2020
People recording acts of aggression and violence frequently find the assailant notices them, swipes their phone, and smashes it or deletes the evidence. Instead, ideally your phone would stream the video to a private recording server. Now it can using Rust and web API’s.
Dispelling Decentralization Doubts
Posted by scriptjunkie in Uncategorized on January 17, 2020
Recently at the 36th CCC, Moxie Marlinspike gave a talk claiming decentralized systems are unable to adapt and succeed and that centralized systems can meet the same goals better. Here’s why he’s wrong.
Should there be restrictions on the release of hacking tools?
Posted by scriptjunkie in Uncategorized on December 24, 2019
This is a text outline of the interactive version available here 1.1. No. Authors of such software should decide for themselves what the best release policy should be 1.1.1. Pro: Authors of security tools are in the best position to make judgements on whether to share and how much, and routinely do 1.1.2. Pro: Pissing […]
Interface Identifier (IID) list
Posted by scriptjunkie in Uncategorized on May 11, 2019
Interface Identifiers (IID’s) are used to obtain function tables to call most methods of COM objects. In source code, a name like IID_Column will be used, but when this is compiled, the binary will only have the corresponding GUID like {FD1C5F63-2B16-4D06-9AB3-F45350B940AB} embedded in the binary. When reverse engineering it is often unclear what IID a […]
Windows 10 Decontamination Scripts
Posted by scriptjunkie in Defense on July 14, 2018
One of the main benefits of our setup we have is that our system will not update automatically. The main problem though, is that it will not update automatically. But we still do want security updates, so it would be nice to let those through, while still blocking any other unwanted updates and the other undesirable activity that is also conducted from the same process (svchost.exe). So instead, I installed Python and wrote my own, which was far less difficult than I had originally assumed since you can generally scrape all the info you want from catalog.update.microsoft.com
Signed Malware
Posted by scriptjunkie in Uncategorized on March 11, 2018
I recently saw a quote on Twitter along the lines of “I couldn’t be in threat intel because I’d get too carried away, go too far, and end up calling some hacker’s mom.” I had to laugh since I can relate. It is easy to get carried away and you can find a lot of […]