Elias AugustoRobbing the IoT Graveyard: A Foray into Info Gathering and Enumeration with the InternetVue 2100I put my post-Defcon energy to use in another one of my obsolete embedded device reverse engineering projects.Aug 12, 2021Aug 12, 2021
Elias AugustoWindows Embedded Compact Exploit Development: Modern ExploitationIt’s time to take this series in a new direction.Feb 6, 20201Feb 6, 20201
Elias AugustoPocket PC Exploit Development: Interlude — Malware Analysis and Windows Media Player CrashesA mini article about progress made fuzzing Windows CEJan 29, 2020Jan 29, 2020
Elias AugustoPocket PC Exploit Development: New Platform, New Beginnings, and a POC ExploitHow I discovered a denial of service bug in Windows Media Player 10 for Pocket PCJan 12, 2020Jan 12, 2020
Elias AugustoWindows CE SuperH3 Exploit Development Part…0: A Statement and a Fresh StartTo new beginnings…Sep 18, 2019Sep 18, 2019
Elias Augusto32 Bit Windows Kernel Mode Rootkit Lab Setup with INetSimMalware analysis lab setup with inetsimMay 2, 2019May 2, 2019
Elias AugustoGrey Box Testing: How I Passed the GIAC GREM Exam Without Taking the CourseHow I passed the GIAC exam without any GIAC materials, whether you should do that same, and the exam preparation process.Apr 29, 20193Apr 29, 20193
Elias AugustoWindows CE SuperH3 Exploit Development Interlude: Usable Null-Free RISC Shellcode and ASCII…An example of usable shellcode for SH3 Windows CE machines and a null-free version of my C++ parameter translation guide…Apr 3, 2019Apr 3, 2019
Elias AugustoWindows CE SuperH3 Exploit Development Part 4: RISC Shellcoding Philosophy and ExamplesIn which I cover example sh3 shellcode, parameter analysis for Windows CE RISC shellcode writing, and Windows CE function call conventions…Apr 1, 2019Apr 1, 2019
Elias AugustoWindows CE SuperH3 Exploit Development Part 4: Buffer Overflows Take Two, Heap Spritzing, and…Taking what I learned from a failed attempt to exploit a buffer overflow and applying it to achieve success…Mar 26, 2019Mar 26, 2019