How to hack a turned-off computer, using Intel Management Engine

In this great speech on BlackHat Europe 2017, Mark Ermolov and Maxim Goryachy by Positive Technology talks about the Intel Management Engine subsystem and how the recently discovered vulnerabilities can be used in order to compromise a system.

Continue reading “How to hack a turned-off computer, using Intel Management Engine”

FLOSS: FireEye Labs Obfuscated String Solver — Automatically extract obfuscated strings from…

Malware authors pack their software to resist reverse engineering and enable their operations to survive longer.

However, many features of packing are easy to automatically identify during static or dynamic analysis.

Continue reading “FLOSS: FireEye Labs Obfuscated String Solver — Automatically extract obfuscated strings from…”