Archive for November, 2013

Nanomite – Graphical Debugger for x64 and x86 on Windows

Author: Zer0Flag

beta 16
+ fixed a bug which can lead to a crash of the debugge when using step over while debugge was running
+ fixed a bug which can lead to a crash while using step over
+ fixed a bug which can lead to a crash when using more than one memory breakpoint
+ fixed a bug which can lead to a missing display of disassembly when breaking on a onexecute memory bp
+ fixed a bug which lead to a lost commandline when restarting as admin
+ fixed a bug which did not clean up correctly if restarting the file over the recent debugged file menu
+ added space shortcut in disassembly view to edit instruction
+ added error message if x86 build wants to load x64 binarys
+ added entropy check to display a warning if a (may) packed or crypted file will be started
+ added support for different breakpoint sizes
+ added resolving of drag n dropped .lnk files
+ added bookmarks
+ added comments
+ added HLT and UD2 software breakpoint types
+ added project files
+ added different performance improvements
+ updated dbghelp to version 6.3.9600

– Supported breakpoint sizes are 1,2 and 4 bytes for software and hardware breakpoints
– In the breakpoint manager you can now choose between int3, hlt and ud2 software breakpoints
– int3 = 0xCC
– hlt = 0xF4
– ud2 = 0x0F0B
– Project files allow to save and load bookmarks, comments, patches and breakpoints of the current project

Download here:

Posted Image

Coursera – Malicious Software and its Underground Economy: Two Sides to Every Story
English | Jun 17th 2013 | mp4, pdf | H264 960×540 | AAC 2 ch 126 kbps | 835 MB
eLearning | Workload: 5-10 hours/week
Cybercrime has become both more widespread and harder to battle. Researchers and anecdotal experience show that the cybercrime scene is becoming increasingly organized and consolidated, with strong links also to traditional criminal networks. Modern attacks are indeed stealthy and often profit oriented.

Malicious software (malware) is the traditional way in which cybercriminals infect user and enterprise hosts to gain access to their private, financial, and intellectual property data. Once stolen, such information can enable more sophisticated attacks, generate illegal revenue, and allow for cyber-espionage.

By mixing a practical, hands-on approach with the theory and techniques behind the scene, the course discusses the current academic and underground research in the field, trying to answer the foremost question about malware and underground economy, namely, “Should we care?”.

Students will learn how traditional and mobile malware work, how they are analyzed and detected, peering through the underground ecosystem that drives this profitable but illegal business. Understanding how malware operates is of paramount importance to form knowledgeable experts, teachers, researchers, and practitioners able to fight back. Besides, it allows us to gather intimate knowledge of the systems and the threats, which is a necessary step to successfully devise novel, effective, and practical mitigation techniques

Recommended Background
Operating Systems, Computer Architecture, Computer Security Class (optional)

Course Format
The course materials will incorporate video/audio learning content with formative assessments and the addition of hands-on challenges to be completed by the students as self-assessed study.

Download here: