FaceWhisperer, 664
Fadecandy, 194
Fail0verflow, 423
Falkner, Katrina, 50
fbz, 126, 128
FCC, 26, 82
FDF, 476
Fenders, Trolly, 13
Fermentation, 61
Ferrie, Peter, 220, 374
Feynman, Alice, 687
Feynman, Richard, 436
FFT, 707
Filedescriptor, 455
Firefox, 472
Firmware, 174, 194, 210, 311, 343, 387, 403, 659, 676
Floppy Disk, 220, 374
Forensics, 57
FormCalc, 457
Forshaw, James, 645
Fortran, Soldier of, 490
Fouladi, Behrang, 438
Galaksija, 84
Galileo, 13
Gambatte, 147, 190
GameBoy, 144, 190
Gaming, 220, 374
GDB, 685
Gelfand, Israel, 697
Geman, Donald, 738
Geman, Stuart, 738
GetProcAddress, 536
Ghanoun, Sahand, 438
Ghostscript, 757
Glitching, 663
Globalstar, 20
GnuPG, 43
GNURadio, 20, 449, 732
Gonadotropin, 208
Goodspeed, Travis, 71, 311, 387, 403, 664, 676
Gray Coding, 716
Group Code Recording, 234
GRSecurity, 19
Grugq, 13
Guinart, Olivier, 268
Gustafsson, Roland, 308
Hall, Joseph, 437
Handbook, Shellcoder’s, 548
Hash Collision, 535, 652, 698
Haverinen, Juhani, 355
HAVOC, 552
Heap, 31
Heineman, Rebecca, 264
Heinlein, Robert A., 82
Hickey, Patrick, 335
Hlavaty, Peter, 31
Holtek, 205
HOPE, 691
Hornby, Taylor, 43
HR C5000, 313
HT48C06, 205
HTML, 194, 415
HTTP, 200, 415, 453
HVCI, 576
Hypervisor, 47, 576
IBM, 490
IDA Pro, 327, 342, 393, 403, 679
Ilari, 144
Infocom, 223, 491
Inführ, Alex, 457
Insertscript, see Inführ, Alex
Internet Explorer, 472
Internet of Things, 702
Intuos Pro, 674
Ionescu, Alex, 33, 553
iPhone Dev Team, 423
Hрония судьбы, 535
Irsdl, see Dalili, Soroush
ISM Band, 702
IVT, 320, 403, 667
Javascript, 200, 419, 473, 589
JCL, 496
Johns Hopkins, 738
JSON, 472
JT65, 71
JTAG, 194
Juels, Ari, 50
Junk Hacking, 342
Juras, Zvonko, 122
K1JT, 71
KA1OVM, 71
Kaba Mas, 688
Keen Team, 31
Kernel Threads, 553
KK4VCZ, 311, 676
Knight, Matt, 702
Knuth, Donald, 143, 200
Kolmogorov, Andrei, 697
Kotowicz, Krzysztof, 453
Krakić, Blažo, 122
Labrosse, Jean J., 331
Lady Ada, 662
Lakatos, Imre, 734
Langsec, 587
Laphroaig, Manul, 13, 139, 342, 431, 687, 734
LATEX, 128
Laughton, Paul, 635
LC87, 662
Lebrun, Arnaud, 437
Lechner, Pieter, 308
LED, 215
Lekies, Sebastian, 481
Ligatti, Jay, 396
Linux, 35, 676
Literate Programming, 139, 200
Liusvaara, Ilari, 144
LLVM, 396
Lock, 687
LoRa, 702
LSNES, 144, 190
Lu, Jihui, 31
Lua, 181
Luebbert, William F., 308
LZMA, 289
M/o/Vfuscator, 483
Mainframe, 490
MAME, 347, 383
Manchester Coding, 719
Mandt, Tarjei, 31
Master Boot Record, 355
McAfee Enterprise, 57
MD380, 311, 676
memset(), 43
Metasploit, 549
mfence, 47
MiCasaVerde, 440
MicroC/OS-II, 331, 683
Miller, Charlie, 343
MIME Type, 454
Minesweeper, 489
Minsky Rotation, 621
MIPRO, 122
MIPS, 401
MKE04Z8VFK4, 194
Mockingboard, 277
Molnár, Gábor, 453
Monroe, Marilyn, 126
Moore, Colby, 20
MotoTrbo, see DMR
MPlayer, 128
MSP430, 403
Mudge, 552
Murphy, Dade, 499
Myers, Michael, 535
Network Job Entry, 490
Neubauer, Doug, 604
Nibbles, 355
NJE, 490
Nodal Message Records, 505
NOP Sled, 345
NPAPI, 472
Nyquist rate, 673
O’Brien, Kathleen, 635
O’Flynn, Collin, 663
Obfuscation, 483
Object Manager Namespace, 645
OMVS, 491
ONsemi, 662
Opcode, Illegal, 279
OpenBarley, 449
OpenZwave, 437
Orland, Kyle, 189
Ormandy, Tavis, 31
OS/360, 490
osdev.org, 355
Ossmann, Michael, 20, 318
OWASP, 455
P25, 311
P4Plus2, 144
Pac Man, 604
Packet in Packet, 79
Page Fault Liberation Army, 483
Pascal, 292
Password, 45
PatchGuard, 553
PaX, 19
PCAP, 448
PCB, 208, 667
PDF, 415, 453, 593, 757
PDFium, 420
Peak Computation, 431
(212) PE6-500, 691
Perl, 420
Pfistner, Stephan, 481
Philippe, Teuwen, 415, 593, 757
Photodetector, 215
Phrack, 18, 71, 491, 535
PHY, 20, 702
PIC16, 205
Picod, Jean-Michel, 437
Pigeonhole Principle, 698
PIT, 355
Plumbing, 734
Pokémon, 144, 190
Pólya, György, 697
Polyglot, 128, 190, 415, 453, 593, 757
Pong, 146
Popper, Karl, 734
Population Bomb, 433
PostScript, 757
Potter, Jordan, 144
Pregnancy Test, 205
Preservation, 220, 374
Preshing, Jeff, 51
PRNG, 699, 723
ProDOS, 220
PSK, 20
Puzzle Corner, 131
Pwn2Own, 31
Qboot, 267
Qemu, 355, 676
Qkumba, see Ferrie, Peter
Quine, 415
Rabbit Test, 205
Race Condition, 645
Rad Warrior, 381
Radare2, 327, 393, 403, 679
Radio, 20, 437
Amateur, 71, 311, 676
Räisänen, Oona, 131
Ramsey, Ben, 437
Real Mode, 355
Recon, 31, 47
Reiter, Michael K., 50
Renesas, 674
REPL, 590
ret2dir, 42
Reynolds, Aaron R., 603
RFID, 659
RISC, 387, 483
Ristanović, Dejan, 84
Ristenpart, Thomas, 50
ROM, 292
ROP, 18,
397, 437, 553, 669
Rosetta Flash, 456
Rowhammer, 132
RTOS, 331
RTTY, 82
Ruby, 415
Самиздат, 415, 687
Sanitization, 587
Sanyo, 662
Satellite, 20
Sather, Jim, 264
Scapy, 437
SCIF, 688
Scott, Micah Elizabeth, 194, 659
Security, Physical, 687
Seeber, Balint, 715
Self-Modifying Code, 181, 286, 355
Semtech, 702
Sethi, Shikhin, 355
Shellcode, 535
Shepherd, Owen, 355
Shim Database Compiler, 740
Shugart SA400, 226
Sidechannel, 47
Silvanovich, Natalie, 344
Skape, 571
Skywing, 571
SLUB, 35
SMEP, 567
SMT Solver, 549
Snake, 146, 355
SNES, 144
Software Defined Radio, 29, 437, 702
Soviet Union, 535
Space Invaders, 604
Spagnuolo, Michele, 456
Speedrun, Tool Assisted, 146
Speers, Ryan, 387, 403
Spellbreaker, 223
SPI
EEPROM, 442
Flash, 314
Spin Lock, 687
SpiraDisc, 275
SPOT, 20
SpyEye, 551
SQL Injection, 587
SRAM, 151
Star Raiders, 604
Star Wars, 347
Starcross, 223
Stevens, Didier, 548
STM32, 313, 387, 684
Dr. Strangelove, 217
Strongly Ordered Model, 51
Studebaker, 343
Sugihara, Kokichi, 756
Sultanik, Evan, 415, 535, 687, 757
Super GameBoy, 144
Super NES, 190
SWD, 194
SWF, see Adobe
Szemerédi, Endre, 699
Tamagotchi, 142, 207
TASBot, 148
Taylor, Joe, 71
TCP/IP, 499
TCP/IPa, 61
Tektronix 1720, 350
TelosB, 410
Terminator (T-800), 607
Tetranglix, 355
Teuwen, Philippe, 128, 190
Texas Instruments, 342
The 4th R – Reasoning, 261, 385
TinyOS, 410
TNC, 79
Total Phase, 317
Translation Lookaside Buffer, 568
Tron, 355
TSO, 491
Tuco the Cat, 661
Turing Completeness, 13, 483, 577, 671
Twiizers, Team, 423
Tytera, 311, 676
Ubertooth, 318
UMPOwn, 553
Underhanded Crypto Contest, 43
USB, 311, 664
Usenix
Security, 50, 311
WOOT, 483
Valasek, Chris, 34
Vectorportal, 129
Vectorscope, 350
Vesalius, Andreas, 139
VIM, 577
Virtualization, 47
Vivisection, 139
VLC, 128
VMWare, 317
Vogelfrei, 71
Vorontsov, Vladimir, 481
V.st, 350
W7PCH, 335
Wacom Tablet, 662
Wang, Haining, 50
WavPack, 128
WB4APR, 71
Wen, Jun, 702
Wiest, Lorenz, 604
Wilkinson, Bill, 635
Windows, 31, 535, 645, 740 10, 553
Windows 3.1, 603
Witchcraft Compiler Collection, 686
Worth, Don, 308
Wozniak, Amanda, 205
Wu, Zhenyu, 50
WV, 128
x86, 47, 396, 483
XFDF, 476
XlogicX, 57, 355
XSS, 453
Xu, Wen, 42
Xu, Zhang, 50
Yarom, Yuval, 50
Yeast, 61
Yugoslavia, 84
Z-Wave, 437
z/OS, 490
Z3, 549
Z80, 84, 153
Zer0mem, 31
Zero Cool, 499
Zhang, Yinqian, 50
ZIP, 415, 593, 757
Zork, 491
ZW0501
Transceiver, 443
Zylon, 604
Colophon
The text of this bible was typeset using the LATEX document markup language for the TEX document preparation system. The primary typefaces used in this bible are from the Computer Modern family, created by Donald Knuth in METAFONT. The æsthetics of this book are attributable to these excellent tools.
This bible contains one hundred ninety-one thousand eight hundred forty-seven words and one million fourteen thousand seven hundred fifty-seven characters, including those of this sentence.
Footnotes
Introduction
1 PoC‖GTFO 9:3 on page 20.
2 PoC‖GTFO 9:9 on page 71.
3 PoC‖GTFO 12:3 on page 437.
4 PoC‖GTFO 13:7 on page 702.
5 PoC‖GTFO 9:10 on page 84.
6 PoC‖GTFO 10:7 on page 220 and PoC‖GTFO 11:5 on page 374.
7 PoC‖GTFO 13:2 on page 604.
8 PoC‖GTFO 10:8 on page 311.
9 PoC‖GTFO 13:5 on page 676.
10 PoC‖GTFO 9:4 on page 31.
11 PoC‖GTFO 12:8 on page 553.
12 PoC‖GTFO 13:4 on page 659.
13 PoC‖GTFO 9:12 on page 128.
14 PoC‖GTFO 10:4 on page 190.
15 PoC‖GTFO 11:9 on page 415.
16 PoC‖GTFO 12:11 on page 593.
9 Elegies of the Second Crypto War
1 Whether one actually understands them or not—and, if you value your sanity, do not try to find if your physics teachers actually understand them either. You have been warned.
2 Not that stationary steam engines were weaklings either: driving ironworks and mining pumps takes a lot of horses.
3 Typically, a priest of a religion that involves central planning and state-run science. This time they’ll get it right, never fear!
4 The question of whether that which is not power is still knowledge is best left to philosophers. One can blame Nasir al-Din al-Tusi for explaining the value of Astrology to Khan Hulagu by dumping a cauldron down the side of a mountain to wake up the Khan’s troops and then explaining that those who knew the causes above remained calm while those who didn’t whirled in confusion below—but one can hardly deny that being able to convince a Khan was, in fact, power. Not to mention his horde. Because a Khan, by definition, has a very convincing comeback for “Yeah? You and what horde?”
5 And some of these papers were true Phrack-like gems that, true to the old-timey tradition, explained and exposed surprising depths of common mechanisms: see, for example, SROP and COOP.
6 While, for example, products of the modern web development “revolution” already do, despite being much less complex than a CPU.
7 “Are Simplex Messages Secure,” GlobalStar Product Support, Feb. 2009.
8 DSSS theory shows us that DSSS is the same as BPSK for a BPSK data signal.
9 git clone https://github.com/synack/globalstar unzip pocorgtfo09.pdf globalstar.tar.bz2
10 http://www.k33nteam.org/noks.html
11 http://j00ru.vexillium.org/dump/recon2015.pdf
12 Intro to Windows Kernel Security Research by T. Ormandy, May 2013.
13 This Time Font Hunt You Down in 4 Bytes, Peter Hlavaty and Jihui Lu, Recon 2015
14 Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool, Alex Ionescu, Dec 2014
15 Windows 8 Heap Internals presentation.
16 SLUB, the unqueued slab allocator, has been the default since Linux 2.6.23.
17 SPLICE When Something is Overflowing by Peter Hlavaty, Confidence 2015
18 ret2dir: Ret
hinking Kernel Isolation by Kemerlis, Polychronakis, and Keromytis
19 Universal Android Rooting is Back! by Wen Xu, BHUSA 2015 unzip pocorgtfo09.pdf bhusa15wenxu.pdf
20 unzip pocorgtfo09.pdf uhc-subs.tar.xz
21 FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack by Yarom and Falkner from USENIX Security 2014
22 Cross-Tenant Side-Channel Attacks in PaaS Clouds by Zhang et al at ACM CCS 2014
23 Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud by Wu, Xu, and Wang at USENIX Security 2012
24 Weak vs. Strong Memory Models from Preshing on Programming
25 unzip pocorgtfo09.pdf crossvm.pdf
26 git clone https://github.com/BinaryBrewWorks/Beer unzip pocorgtfo09.pdf beer.zip
27 jt65stego by Drapeau (KA1OVM) and Dukes, 2014
28 This is the exact opposite of your WiFi, where every data frame is acknowledged, and no more data is sent unless either the ACK arrives or a timeout is reached.
29 unzip pocorgtfo09.pdf aprsl01.pdf
30 Don’t do this. Acting like an asshole on the radio is the surest way to convince a brilliant RF engineer to spend his retirement hunting you down.
31 In Heinlein’s “Between the planets,” 1951, the same celestial path of the Circum-Terra station is used for a much less benign purpose: worldwide delivery of nukes. That book also introduced the idea of stealth technology vehicle with a radar-reflecting surface, long before any scientific publications on the subject. —PML
32 unzip pocorgtfo09.pdf encham.html #Encryption and Amateur Radio by KD0LIX
33 unzip pocorgtfo09.pdf part97.pdf
34 Also note §97.217: Telemetry transmitted by an amateur station on or within 50 km of the Earth’s surface is not considered to be codes or ciphers intended to obscure the meaning of communications.
35 Yes, this is the one thing all instruction manuals tell you never to do.
36 Mechanical parts = 4600, set of ICs = 6500, 3250 import fees, housing and passive components = 1200 dinars.
37 Sorry Spectrum and ZX 81 owners!
38 Why the fifth? Well, because this special edition doesn’t reach all the kiosks at the same time. We wish, therefore, all the readers to have the same chances.
39 This is not a mistake, two different MIPRO companies are helping our action!
40 http://en.true-audio.com/TTA_Lossless_Audio_Codec_-_Format_Description
41 http://wiki.hydrogenaud.io/index.php?title=APEv2_specification
42 http://www.wavpack.com/file_format.txt
43 http://www.vecteezy.com/people/23511-marilyn-monroe-vector
10 The Theater of Literate Disassembly
1 unzip pocorgtfo10.pdf adventure.pdf
2 http://tasvideos.org
3 It should also be noted that all recent AGDQ events have directly benefited the Prevent Cancer Foundation which was a huge motivator for several of us who worked on this project. The block we presented this exploit in at AGDQ 2015 helped raise over $50K and the marathon as a whole raised more than $1.5M toward cancer research, making this project a huge success on multiple levels.
4 In brief, the detection routine is extremely sensitive to how many DMG clock cycles various operations take; the emulator is likely slightly inaccurate, which causes the detection to fail, but from looking at the behavior it seems like it “just works” on the real hardware. This is sheer luck, and the game developers likely never even knew it was so fragile.
PoC or GTFO, Volume 2 Page 42