Travis Goodspeed

@travisgoodspeed
435 Followers
81 Following
26 Posts
neat little fact about CRCs and stream ciphers: if you append a CRC to a message, you always get the same CRC.
if you encrypt the resulting message with a stream cipher, the CRC of the message is cancelled out so you essentially get the CRC of the keystream. as a result, if you encrypt 2 different files of same length with CRC appended with the same (unsalted) key, you get the same CRC on the encrypted file

Nifty 8051 reversing tool by @8051enthusiast, including a base address finder and recovery of symbol names for library functions. Proper comments, which are worth more than gold when you're trying to learn to do this stuff yourself.

https://github.com/8051Enthusiast/at51

GitHub - 8051Enthusiast/at51: Applications for reverse engineering architecture 8051 firmware

Applications for reverse engineering architecture 8051 firmware - 8051Enthusiast/at51

GitHub
Once upon a time in 1993 I was a teen, and I wrote a Pascal compiler for transputer. I was learning so many things. I've wrote an article about it, and released the code, along a newly coded transputer emulator 😉 #retro #transputer https://nanochess.org/pascal.html
My teen years: The Pascal compiler for transputer

History of the development of my Pascal compiler for transputer when I was age 13.

when it comes time to assemble this thing, future-joey owes me a beer for being so thoughtful
Thanks for your attention,
it was fun!
I crafted a working Doom polyglot:
Dos executable, Portable executable and PDF.
https://www.youtube.com/live/nG2RZrD4kAo?si=iyU-4ce8xTIfC3o6
15 .EXE Dos program

YouTube

Anyone interested in microcontroller exploits?

Here's how I started with a pair of protected 68HC705s and some blanks, and ended with a ROM dump.

(It is, of course, a fault injection attack)

https://www.philpem.me.uk/elec/security/68hc705c8_dump
https://github.com/philpem/68hc705_glitcher

#electronicsrepair

Dumping a protected MC68HC705C8S

Dumping a protected MC68HC705C8S This is the writeup which goes with my 68HC705C8 Glitcher Github project. I'm involved with some of the reverse-engineering side of HackTV development, and as part of that I tear apart receivers so we can generate the data formats they need for e.g. EPG data and conditional-access. You can see some of that work in the

philpem.me.uk - Phil Pemberton's website
Gus (@[email protected])

"Beyond BLE: Cracking Open the Black-Box of RF Microcontrollers" is a fascinating 38C3 technical reversing talk: undocumented functionality, custom processor ISAs, making an open source toolchain, etc. Also happy to see they sourced useful info from TI's patents. Disclosing your invention is supposed to be part of the bargain of patents, but increasingly obfuscated by companies writing their patents vaguer and vaguer... https://media.ccc.de/v/38c3-beyond-ble-cracking-open-the-black-box-of-rf-microcontrollers https://youtu.be/Qht3abt7Tx8 #reverseengineering #sdr

Aus.Social
@travisgoodspeed @kenshirriff Thought you'd enjoy this post of recovering data fun a broken board. https://dontvacuum.me/rocketflashrecovery/index.html
Crashing rockets and recovering data from damaged flash chips

Oh hooooo: Advent of Radare2

https://www.radare.org/advent/

#me-all-ears #radare2 cc: @radareorg

Advent Of Radare2

🔥 The initial schedule for #r2con2024 is now public! The CFP is still open, but we may only accept now if you are fine submitting them for the “Online Sunday” in video format. https://radare.org/con/2024/

🎟️ Conference tickets and other details will be made available soon. Stay tuned, we will meet us all again in less than two months!