« earlier | later » Page 4 of 11
titus - Totally Isolated TLS Unwrapping Server edit / delete
This has some nice examples of good practice in privilege separation. (Pity it's written in C++!)
to networking privilege-separation security software tls ... on 28 February 2016
tsgates/mbox: A lightweight sandbox tool for non-root users edit / delete
seccomp-based syscall redirection (it's a bit more than just sandboxing; you could do debug/trace stuff with this technique too).
to linux sandbox seccomp security software syscall ... on 28 February 2016
main is usually a function: Writing kernel exploits edit / delete
A nice introduction, along with some of the mitigations (circa 2012).
This is right on the edge between amusing security-related writing and outright trolling. Some good stuff here, though.
to amusements security ... on 22 January 2016
Clang Hardening Cheat Sheet edit / delete
clang's equivalents of the GCC hardening options. Mostly the same.
to c c++ clang compiler gcc hardening security ... on 16 January 2016
diafygi/acme-tiny edit / delete
A minimal ACME client (for LetsEncrypt). This actually works very well; much less finicky than the official client.
to acme letsencrypt security software tls ... on 31 December 2015
The Six Dumbest Ideas in Computer Security edit / delete
Probably best viewed as starting points for discussion...
to design philosophy security software-engineering ... on 31 December 2015
Articles on Historical Cryptography edit / delete
Going back to the 16th century. Lots of interesting stuff here.
to code cryptography history security ... on 20 November 2015
Blind Return Oriented Programming (BROP) edit / delete
"Evolving" an ROP attack against an automatically-restarting server. This works by finding two gadgets whose behaviour you can distinguish (e.g. crashing vs. hanging), then constructing ROP chains that will have different behaviour depending on how many items are popped, then trying lots of addresses and combinations of arguments to find gadgets. Neat!
to buffer-overflow exploit rop security ... on 29 June 2015
Debiania — Migrating to LVM on LUKS edit / delete
Constructing an LVM-on-LUKS setup by hand that's the same as the Debian installer will make.
to debian encryption linux luks lvm security ... on 07 June 2015
« earlier | later » Page 4 of 11
tasty by Adam Sampson.