4.75 score from hupso.pl for:
the-interweb.com



HTML Content


Titleprogramming stuff

Length: 18, Words: 2
Description pusty

Length: 0, Words: 0
Keywords pusty
Robots
Charset UTF-8
Og Meta - Title pusty
Og Meta - Description pusty
Og Meta - Site name pusty
Tytuł powinien zawierać pomiędzy 10 a 70 znaków (ze spacjami), a mniej niż 12 słów w długości.
Meta opis powinien zawierać pomiędzy 50 a 160 znaków (łącznie ze spacjami), a mniej niż 24 słów w długości.
Kodowanie znaków powinny być określone , UTF-8 jest chyba najlepszy zestaw znaków, aby przejść z powodu UTF-8 jest bardziej międzynarodowy kodowaniem.
Otwarte obiekty wykresu powinny być obecne w stronie internetowej (więcej informacji na temat protokołu OpenGraph: http://ogp.me/)

SEO Content

Words/Characters 6883
Text/HTML 47.54 %
Headings H1 1
H2 1
H3 25
H4 15
H5 0
H6 0
H1
programming stuff
H2
H3
wednesday, january 4. 2012
saturday, august 13. 2011
monday, june 20. 2011
wednesday, june 8. 2011
monday, may 9. 2011
tuesday, april 26. 2011
saturday, march 12. 2011
friday, march 11. 2011
thursday, march 10. 2011
friday, march 4. 2011
wednesday, march 2. 2011
sunday, january 17. 2010
tuesday, october 27. 2009
saturday, october 17. 2009
saturday, june 20. 2009
calendar
quicksearch
archives
contact
links
top exits
syndicate this blog
blog administration
powered by
categories
H4 cheating in single-player freemium games
book review: metasploit - the penetration tester's guide
release of swfretools 1.3.0
release of swfretools 1.2.0
release of swfretools 1.1.0
data mining h-1b salary data
cansecwest 2011 - day 3
cansecwest 2011 - day 2
cansecwest 2011 - day i
release of jhexview 1.0
writing file format parsers for reverse engineering tools: insights from someone who does it too often
data sent home by ?torrent
san francisco
toad houses disassembled
debugging emulated cisco devices with binnavi
H5
H6
strong
b
i
em
Bolds strong 0
b 0
i 0
em 0
Zawartość strony internetowej powinno zawierać więcej niż 250 słów, z stopa tekst / kod jest wyższy niż 20%.
Pozycji używać znaczników (h1, h2, h3, ...), aby określić temat sekcji lub ustępów na stronie, ale zwykle, użyj mniej niż 6 dla każdego tagu pozycje zachować swoją stronę zwięzły.
Styl używać silnych i kursywy znaczniki podkreślić swoje słowa kluczowe swojej stronie, ale nie nadużywać (mniej niż 16 silnych tagi i 16 znaczników kursywy)

Statystyki strony

twitter:title pusty
twitter:description pusty
google+ itemprop=name pusty
Pliki zewnętrzne 1
Pliki CSS 1
Pliki javascript 0
Plik należy zmniejszyć całkowite odwołanie plików (CSS + JavaScript) do 7-8 maksymalnie.

Linki wewnętrzne i zewnętrzne

Linki 211
Linki wewnętrzne 123
Linki zewnętrzne 88
Linki bez atrybutu Title 149
Linki z atrybutem NOFOLLOW 0
Linki - Użyj atrybutu tytuł dla każdego łącza. Nofollow link jest link, który nie pozwala wyszukiwarkom boty zrealizują są odnośniki no follow. Należy zwracać uwagę na ich użytkowania

Linki wewnętrzne

cheating in single-player freemium games /serendipity/index.php?/archives/141-cheating-in-single-player-freemium-games.html
comments (2) /serendipity/index.php?/archives/141-cheating-in-single-player-freemium-games.html#comments
trackbacks (0) /serendipity/index.php?/archives/141-cheating-in-single-player-freemium-games.html#trackbacks
cheating in single-player freemium games /serendipity/index.php?/archives/141-cheating-in-single-player-freemium-games.html
book review: metasploit - the ... /serendipity/index.php?/archives/140-book-review-metasploit-the-penetration-testers-guide.html
comments (0) /serendipity/index.php?/archives/140-book-review-metasploit-the-penetration-testers-guide.html#comments
trackbacks (0) /serendipity/index.php?/archives/140-book-review-metasploit-the-penetration-testers-guide.html#trackbacks
book review: metasploit - the penetration tester's guide /serendipity/index.php?/archives/140-book-review-metasploit-the-penetration-testers-guide.html
release of swfretools 1.3.0 /serendipity/index.php?/archives/139-release-of-swfretools-1.3.0.html
comments (0) /serendipity/index.php?/archives/139-release-of-swfretools-1.3.0.html#comments
trackbacks (0) /serendipity/index.php?/archives/139-release-of-swfretools-1.3.0.html#trackbacks
release of swfretools 1.3.0 /serendipity/index.php?/archives/139-release-of-swfretools-1.3.0.html
release of swfretools 1.2.0 /serendipity/index.php?/archives/138-release-of-swfretools-1.2.0.html
comments (0) /serendipity/index.php?/archives/138-release-of-swfretools-1.2.0.html#comments
trackbacks (0) /serendipity/index.php?/archives/138-release-of-swfretools-1.2.0.html#trackbacks
release of swfretools 1.2.0 /serendipity/index.php?/archives/138-release-of-swfretools-1.2.0.html
release of swfretools 1.1.0 /serendipity/index.php?/archives/137-release-of-swfretools-1.1.0.html
comments (0) /serendipity/index.php?/archives/137-release-of-swfretools-1.1.0.html#comments
trackbacks (0) /serendipity/index.php?/archives/137-release-of-swfretools-1.1.0.html#trackbacks
release of swfretools 1.1.0 /serendipity/index.php?/archives/137-release-of-swfretools-1.1.0.html
data mining h-1b salary data /serendipity/index.php?/archives/136-data-mining-h-1b-salary-data.html
comments (8) /serendipity/index.php?/archives/136-data-mining-h-1b-salary-data.html#comments
trackbacks (0) /serendipity/index.php?/archives/136-data-mining-h-1b-salary-data.html#trackbacks
data mining h-1b salary data /serendipity/index.php?/archives/136-data-mining-h-1b-salary-data.html
continue reading "data mining h-1b salary data" /serendipity/index.php?/archives/136-data-mining-h-1b-salary-data.html#extended
cansecwest 2011 - day 3 /serendipity/index.php?/archives/134-cansecwest-2011-day-3.html
comments (0) /serendipity/index.php?/archives/134-cansecwest-2011-day-3.html#comments
trackbacks (0) /serendipity/index.php?/archives/134-cansecwest-2011-day-3.html#trackbacks
cansecwest 2011 - day 3 /serendipity/index.php?/archives/134-cansecwest-2011-day-3.html
- /bdump/misc/csw19.jpg
- /bdump/misc/csw18.jpg
- /bdump/misc/csw17.jpg
- /bdump/misc/csw16.jpg
cansecwest 2011 - day 2 /serendipity/index.php?/archives/133-cansecwest-2011-day-2.html
comments (3) /serendipity/index.php?/archives/133-cansecwest-2011-day-2.html#comments
trackbacks (0) /serendipity/index.php?/archives/133-cansecwest-2011-day-2.html#trackbacks
cansecwest 2011 - day 2 /serendipity/index.php?/archives/133-cansecwest-2011-day-2.html
- /bdump/misc/csw15.jpg
- /bdump/misc/csw14.jpg
- /bdump/misc/csw13.jpg
- /bdump/misc/csw12.jpg
- /bdump/misc/csw11.jpg
- /bdump/misc/csw10.jpg
- /bdump/misc/csw9.jpg
cansecwest 2011 - day i /serendipity/index.php?/archives/132-cansecwest-2011-day-i.html
comment (1) /serendipity/index.php?/archives/132-cansecwest-2011-day-i.html#comments
trackbacks (0) /serendipity/index.php?/archives/132-cansecwest-2011-day-i.html#trackbacks
cansecwest 2011 - day i /serendipity/index.php?/archives/132-cansecwest-2011-day-i.html
release of jhexview 1.0 /serendipity/index.php?/archives/131-release-of-jhexview-1.0.html
comment (1) /serendipity/index.php?/archives/131-release-of-jhexview-1.0.html#comments
trackbacks (0) /serendipity/index.php?/archives/131-release-of-jhexview-1.0.html#trackbacks
release of jhexview 1.0 /serendipity/index.php?/archives/131-release-of-jhexview-1.0.html
custom .net component for displaying binary data in a hex editor /serendipity/index.php?/archives/43-nethex-1.0.html
this former post of mine /serendipity/index.php?/archives/96-hexer-1.0.0.html#extended
writing file format parsers for ... /serendipity/index.php?/archives/130-writing-file-format-parsers-for-reverse-engineering-tools-insights-from-someone-who-does-it-too-often.html
comments (2) /serendipity/index.php?/archives/130-writing-file-format-parsers-for-reverse-engineering-tools-insights-from-someone-who-does-it-too-often.html#comments
trackbacks (0) /serendipity/index.php?/archives/130-writing-file-format-parsers-for-reverse-engineering-tools-insights-from-someone-who-does-it-too-often.html#trackbacks
writing file format parsers for reverse engineering tools: insights from someone who does it too often /serendipity/index.php?/archives/130-writing-file-format-parsers-for-reverse-engineering-tools-insights-from-someone-who-does-it-too-often.html
continue reading "writing file format parsers for reverse engineering tools: insights from someone who does it too often" /serendipity/index.php?/archives/130-writing-file-format-parsers-for-reverse-engineering-tools-insights-from-someone-who-does-it-too-often.html#extended
data sent home by ?torrent /serendipity/index.php?/archives/129-data-sent-home-by-torrent.html
comments (10) /serendipity/index.php?/archives/129-data-sent-home-by-torrent.html#comments
trackbacks (0) /serendipity/index.php?/archives/129-data-sent-home-by-torrent.html#trackbacks
data sent home by ?torrent /serendipity/index.php?/archives/129-data-sent-home-by-torrent.html
continue reading "data sent home by ?torrent" /serendipity/index.php?/archives/129-data-sent-home-by-torrent.html#extended
san francisco /serendipity/index.php?/archives/128-san-francisco.html
comments (0) /serendipity/index.php?/archives/128-san-francisco.html#comments
trackbacks (0) /serendipity/index.php?/archives/128-san-francisco.html#trackbacks
san francisco /serendipity/index.php?/archives/128-san-francisco.html
toad houses disassembled /serendipity/index.php?/archives/127-toad-houses-disassembled.html
comments (11) /serendipity/index.php?/archives/127-toad-houses-disassembled.html#comments
trackbacks (0) /serendipity/index.php?/archives/127-toad-houses-disassembled.html#trackbacks
toad houses disassembled /serendipity/index.php?/archives/127-toad-houses-disassembled.html
continue reading "toad houses disassembled" /serendipity/index.php?/archives/127-toad-houses-disassembled.html#extended
debugging emulated cisco devices ... /serendipity/index.php?/archives/126-debugging-emulated-cisco-devices-with-binnavi.html
comments (0) /serendipity/index.php?/archives/126-debugging-emulated-cisco-devices-with-binnavi.html#comments
trackbacks (0) /serendipity/index.php?/archives/126-debugging-emulated-cisco-devices-with-binnavi.html#trackbacks
debugging emulated cisco devices with binnavi /serendipity/index.php?/archives/126-debugging-emulated-cisco-devices-with-binnavi.html
february 2017 /serendipity/index.php?/archives/2017/02.html
january 2017 /serendipity/index.php?/archives/2017/01.html
december 2016 /serendipity/index.php?/archives/2016/12.html
november 2016 /serendipity/index.php?/archives/2016/11.html
october 2016 /serendipity/index.php?/archives/2016/10.html
september 2016 /serendipity/index.php?/archives/2016/09.html
august 2016 /serendipity/index.php?/archives/2016/08.html
july 2016 /serendipity/index.php?/archives/2016/07.html
june 2016 /serendipity/index.php?/archives/2016/06.html
may 2016 /serendipity/index.php?/archives/2016/05.html
recent... /serendipity/index.php?frontpage
- /serendipity/index.php?/feeds/index.rss
rss 0.91 feed /serendipity/index.php?/feeds/index.rss
- /serendipity/index.php?/feeds/index.rss1
rss 1.0 feed /serendipity/index.php?/feeds/index.rss1
- /serendipity/index.php?/feeds/index.rss2
rss 2.0 feed /serendipity/index.php?/feeds/index.rss2
- /serendipity/index.php?/feeds/atom03.xml
atom 0.3 feed /serendipity/index.php?/feeds/atom03.xml
- /serendipity/index.php?/feeds/atom10.xml
atom 1.0 feed /serendipity/index.php?/feeds/atom10.xml
- /serendipity/index.php?/feeds/comments.rss2
rss 2.0 comments /serendipity/index.php?/feeds/comments.rss2
open login screen /serendipity/index.php?/admin
- /serendipity/index.php?/feeds/categories/2-book-reviews.rss
book reviews /serendipity/index.php?/categories/2-book-reviews
- /serendipity/index.php?/feeds/categories/11-hexer.rss
hexer /serendipity/index.php?/categories/11-hexer
- /serendipity/index.php?/feeds/categories/6-ida.rss
ida /serendipity/index.php?/categories/6-ida
- /serendipity/index.php?/feeds/categories/7-malware.rss
malware /serendipity/index.php?/categories/7-malware
- /serendipity/index.php?/feeds/categories/10-misc.rss
misc /serendipity/index.php?/categories/10-misc
- /serendipity/index.php?/feeds/categories/8-nes.rss
nes /serendipity/index.php?/categories/8-nes
- /serendipity/index.php?/feeds/categories/1-faxanadu.rss
faxanadu /serendipity/index.php?/categories/1-faxanadu
- /serendipity/index.php?/feeds/categories/9-fceuxd-sp.rss
fceuxd sp /serendipity/index.php?/categories/9-fceuxd-sp
- /serendipity/index.php?/feeds/categories/5-pelib.rss
pelib /serendipity/index.php?/categories/5-pelib
- /serendipity/index.php?/feeds/categories/12-work.rss
work /serendipity/index.php?/categories/12-work
all categories /serendipity/index.php?frontpage

Linki zewnętrzne

programming stuff http://www.the-interweb.com/serendipity/
http://www.the-interweb.com/serendipity/
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
muffin knight http://www.the-interweb.com/serendipity/exit.php?url_id=865&entry_id=141
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
book reviews http://www.the-interweb.com/serendipity/index.php?/categories/2-book-reviews
metasploit - the penetration tester's guide http://www.the-interweb.com/serendipity/exit.php?url_id=863&entry_id=140
metasploit http://www.the-interweb.com/serendipity/exit.php?url_id=856&entry_id=140
hd moore http://www.the-interweb.com/serendipity/exit.php?url_id=857&entry_id=140
david kennedy http://www.the-interweb.com/serendipity/exit.php?url_id=858&entry_id=140
jim o'gorman http://www.the-interweb.com/serendipity/exit.php?url_id=864&entry_id=140
devon kearns http://www.the-interweb.com/serendipity/exit.php?url_id=860&entry_id=140
mati aharoni http://www.the-interweb.com/serendipity/exit.php?url_id=861&entry_id=140
ida pro book http://www.the-interweb.com/serendipity/exit.php?url_id=862&entry_id=140
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
an example http://www.the-interweb.com/serendipity/exit.php?url_id=853&entry_id=139
download the swfretools from github http://www.the-interweb.com/serendipity/exit.php?url_id=854&entry_id=139
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
available for download http://www.the-interweb.com/serendipity/exit.php?url_id=852&entry_id=138
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
a presentation at source boston http://www.the-interweb.com/serendipity/exit.php?url_id=850&entry_id=137
version 1.1.0 of the swfretools on github http://www.the-interweb.com/serendipity/exit.php?url_id=851&entry_id=137
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
very detailed access database http://www.the-interweb.com/serendipity/exit.php?url_id=846&entry_id=136
very nifty web application http://www.the-interweb.com/serendipity/exit.php?url_id=847&entry_id=136
glassdoor http://www.the-interweb.com/serendipity/exit.php?url_id=848&entry_id=136
my twitter http://www.the-interweb.com/serendipity/exit.php?url_id=849&entry_id=136
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
cansecwest http://www.the-interweb.com/serendipity/exit.php?url_id=821&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=822&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=823&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=824&entry_id=132
pwn2own http://www.the-interweb.com/serendipity/exit.php?url_id=825&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=826&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=827&entry_id=132
- http://www.the-interweb.com/serendipity/exit.php?url_id=828&entry_id=132
http://research.phreedom.org/2011/cansecwest/ http://www.the-interweb.com/serendipity/exit.php?url_id=829&entry_id=132
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
zynamics http://www.the-interweb.com/serendipity/exit.php?url_id=818&entry_id=131
my github account http://www.the-interweb.com/serendipity/exit.php?url_id=819&entry_id=131
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
thread in the official forum http://www.the-interweb.com/serendipity/exit.php?url_id=814&entry_id=129
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
misc http://www.the-interweb.com/serendipity/index.php?/categories/10-misc
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
nes http://www.the-interweb.com/serendipity/index.php?/categories/8-nes
toad house http://www.the-interweb.com/serendipity/exit.php?url_id=812&entry_id=127
sp http://www.the-interweb.com/serendipity/index.php?/authors/1-sp
work http://www.the-interweb.com/serendipity/index.php?/categories/12-work
binnavi http://www.the-interweb.com/serendipity/exit.php?url_id=806&entry_id=126
dynamips http://www.the-interweb.com/serendipity/exit.php?url_id=807&entry_id=126
here http://www.the-interweb.com/serendipity/exit.php?url_id=808&entry_id=126
- http://www.the-interweb.com/serendipity/exit.php?url_id=809&entry_id=126
- http://www.the-interweb.com/serendipity/exit.php?url_id=810&entry_id=126
- http://www.the-interweb.com/serendipity/exit.php?url_id=811&entry_id=126
next page » http://www.the-interweb.com/serendipity/index.php?/archives/p2.html
- http://www.the-interweb.com/serendipity/index.php?/archives/2017/01.html
february '17 http://www.the-interweb.com/serendipity/index.php?/archives/2017/02.html
older... http://www.the-interweb.com/serendipity/index.php?/archive
lambdacube http://www.twitter.com/lambdacube
sporst http://www.flickr.com/photos/sporst
add / xor / rol http://addxorrol.blogspot.com/
www.the-interweb.com http://www.the-interweb.com
en.wikipedia.org http://en.wikipedia.org
www.slideshare.net http://www.slideshare.net
www.amazon.com http://www.amazon.com
the-interweb.com http://the-interweb.com
www.zynamics.com http://www.zynamics.com
www.offensive-security.com http://www.offensive-security.com
nostarch.com http://nostarch.com
www.onlamp.com http://www.onlamp.com
github.com https://github.com
- http://www.s9y.org/
s9y http://www.s9y.org
carl http://www.carlgalloway.com

Zdjęcia

Zdjęcia 49
Zdjęcia bez atrybutu ALT 30
Zdjęcia bez atrybutu TITLE 49
Korzystanie Obraz ALT i TITLE atrybutu dla każdego obrazu.

Zdjęcia bez atrybutu TITLE

/bdump/misc/muffin.png
/bdump/misc/dissector1.png
/bdump/misc/dissector2.png
/bdump/misc/csw19sm.jpg
/bdump/misc/csw18sm.jpg
/bdump/misc/csw17sm.jpg
/bdump/misc/csw16sm.jpg
/bdump/misc/csw15sm.jpg
/bdump/misc/csw14sm.jpg
/bdump/misc/csw13sm.jpg
/bdump/misc/csw12sm.jpg
/bdump/misc/csw11sm.jpg
/bdump/misc/csw10sm.jpg
/bdump/misc/csw9sm.jpg
http://the-interweb.com/bdump/misc/csw3sm.jpg
http://the-interweb.com/bdump/misc/csw2sm.jpg
http://the-interweb.com/bdump/misc/csw4sm.jpg
http://the-interweb.com/bdump/misc/csw5sm.jpg
http://the-interweb.com/bdump/misc/csw6sm.jpg
http://the-interweb.com/bdump/misc/csw8sm.jpg
http://www.the-interweb.com/bdump/misc/utorrent1.png
http://www.the-interweb.com/bdump/nes/smb3_toad_house.png
http://www.the-interweb.com/bdump/zynamics/cisco_1sm.png
http://www.the-interweb.com/bdump/zynamics/cisco_2sm.png
http://www.the-interweb.com/bdump/zynamics/cisco_3sm.png
/serendipity/templates/carl_contest/img/back.gif
http://www.the-interweb.com/dump/email.png
http://www.the-interweb.com/dump/spmail.png
http://status.icq.com/online.gif?icq=142691645&img=21
http://big.oscar.aol.com/riijngoud?on_url=http://www.the-interweb.com/dump/mnb_online.gif&off_url=http://www.the-interweb.com/dump/mnb_offline.gif
http://www.the-interweb.com/bdump/twittericon.png
http://www.the-interweb.com/bdump/flickricon.png
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/default/img/s9y_banner_small.png
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif
/serendipity/templates/carl_contest/img/xml.gif

Zdjęcia bez atrybutu ALT

/bdump/misc/muffin.png
/bdump/misc/dissector1.png
/bdump/misc/dissector2.png
/bdump/misc/csw19sm.jpg
/bdump/misc/csw18sm.jpg
/bdump/misc/csw17sm.jpg
/bdump/misc/csw16sm.jpg
/bdump/misc/csw15sm.jpg
/bdump/misc/csw14sm.jpg
/bdump/misc/csw13sm.jpg
/bdump/misc/csw12sm.jpg
/bdump/misc/csw11sm.jpg
/bdump/misc/csw10sm.jpg
/bdump/misc/csw9sm.jpg
http://the-interweb.com/bdump/misc/csw3sm.jpg
http://the-interweb.com/bdump/misc/csw2sm.jpg
http://the-interweb.com/bdump/misc/csw4sm.jpg
http://the-interweb.com/bdump/misc/csw5sm.jpg
http://the-interweb.com/bdump/misc/csw6sm.jpg
http://the-interweb.com/bdump/misc/csw8sm.jpg
http://www.the-interweb.com/bdump/misc/utorrent1.png
http://www.the-interweb.com/bdump/nes/smb3_toad_house.png
http://www.the-interweb.com/bdump/zynamics/cisco_1sm.png
http://www.the-interweb.com/bdump/zynamics/cisco_2sm.png
http://www.the-interweb.com/bdump/zynamics/cisco_3sm.png
http://www.the-interweb.com/dump/email.png
http://www.the-interweb.com/dump/spmail.png
http://status.icq.com/online.gif?icq=142691645&img=21
http://www.the-interweb.com/bdump/twittericon.png
http://www.the-interweb.com/bdump/flickricon.png

Ranking:


Alexa Traffic
Daily Global Rank Trend
Daily Reach (Percent)









Majestic SEO











Text on page:

programming stuff wednesday, january 4. 2012 cheating in single-player freemium games posted by sp in misc at 04:36 comments (2) trackbacks (0) cheating in single-player freemium games about 15 days ago i bought the game muffin knight for $2.99 from the android market. muffin knight is a freemium game. maybe that's not a completely precise label due to the $2.99 upfront cost but the point is that there is an in-game currency that players can purchase more of with real dollars. this in-game currency, stars, is used to level up your characters, to acquire new skills, and to increase your health points. usually you get 1 star for each level you reach. a back-of-the hand calculation reveals that you would need about 150 stars to unlock everything. that's quite a lot of levelling. about 15 years ago i was young and very interested in cheating in computer games. in fact - and literally nobody who reads this blog post knows this - the first app i wrote for public consumption was a cheat database. its competitive advantage over other cheat databases was that mine had a save game patching engine. it allowed you to patch save game files for games included in the database and it allowed you to extend that engine with your own save game cheats. the commercial success of this program was $10, a pity buy from a friend. it's social success was worse, as one of my school teachers commented in my website guestbook. this was considered deeply uncool at the time. later i also wrote a few game trainers (the ones where you get extra money by pressing certain key combinations) for windows games. nowadays, while playing muffin knight, i am starting to feel an old itch again that i have not felt in a while. i am now a level 62 muffin knight with most expensive things unlocked. i need about 50 more stars to unlock the rest just to reach the feeling of having beaten the game completely. 50 stars go for $4.99 if i buy them the official way or they go for nothing if i modify the save game. i have not actually looked into modifying muffin knight save games yet but according to http://forum.xda-developers.com/archive/index.php/t-1395221.html save games can be traded so i don't see why they could not be modified. and even if they could not be modified, i have plenty of means to change the program code of muffin knight or modify the memory of the running process. in the end, i am sure that i could get the 50 stars for free using some sort of cheat technique. i am wondering what the moral implications of this are. back in the old days, i only wrote cheats and trainers for single-player games. using such cheats never hurt anybody. the game developers had already been paid. the lack of other players meant that only the player who chooses to cheat is affected. everything is morally in the clear here. but what about freemium single player games like muffin knight? i already paid $2.99 to get the game. does that make it ok to use cheats to access in-game content? let's separate things out a bit. there are freemium games like muffin knight and there are freemium games like paradise island and tap fish. their freemium mechanics are very similar with one significant difference. muffin knight is structured kind of like diablo 2. getting everything in these games is an unbearable grind but it's possible. getting everything in paradise island or tap fish is basically not possible unless you reach a biblical age or punch your credit card number into the right form. i call games from the second category 'unsafe for children scam apps'. they are really just wallet openers hiding behind pretty colors. if anybody cheats in games of this category i am not going to shed a single tear. now i am wondering what the closest analogy of freemium content to games of 15 years ago is. i think an optionally purchasable piece of in-game content is closest to an expansion pack. it's a tiny expansion pack but it is one. you pay money to add something to the game. think of the purchased stars in muffin knight as less of an in-game currency and more of what you can get for them: three extra classes and more health points. from this point of view i would have a problem cheating in muffin knight. the developers offer an expansion pack for purchase and just because i could cheat my way into having it is no different than downloading an old pc game expansion pack off some torrent site. i think for now i will keep grinding muffin knight but i am interested in what other people think about this. i have also noticed a disturbing lack of cheats for android games which might tie in with the general theme of this topic. what's the deal here? lack of tools, lack of interest, problems with morality of stealing freemium content? tools are available, dalvik is easy to understand. it's been a long time since getting into game cheating has been so easy. --> saturday, august 13. 2011 book review: metasploit - the ... posted by sp in book reviews at 21:34 comments (0) trackbacks (0) book review: metasploit - the penetration tester's guide recently i received a free review copy of metasploit - the penetration tester's guide from no starch press. i was pretty excited about the book because i have not yet worked with metasploit before, even though i have followed the metasploit development for a long time. for those who do not know, metasploit is a "free open-source penetration testing solution developed by the open source community and rapid7". originally started by hd moore in 2003, it also doubles as one of the world's largest open-source ruby projects. written by the four authors david kennedy, jim o'gorman, devon kearns, and mati aharoni, this new book aims to "teach you the ins and outs of metasploit and how to use the framework to its fullest" while also acknowledging that their "coverage is selective". they set out to live up to that aim on roughly 300 pages divided into 17 chapters and two appendices. the individual chapters are 'the absolute basics of penetration testing' (6 pages), 'metasploit basics' (8 pages), 'intelligence gathering' (20 pages), 'vulnerability scanning' (22 pages), 'the joy of exploitation' (18 pages), 'meterpreter' (24 pages), 'avoiding detection' (10 pages), 'metasploit auxiliary modules' (12 pages), 'the social-engineering toolkit' (28 pages), 'fast-track' (14 pages), 'karmetasploit' (8 pages), ' building your own module' (12 pages), 'creating your own exploits' (18 pages), 'porting exploits to the metasploit framework' (20 pages), 'meterpreter scripting' (17 pages), and 'simulated penetration test' (16 pages). as you can see, due to the small amount of pages and the high number of chapters there is not a lot meat per chapter. in fact, roughly one-third of the book is console output listings or screenshots. that means you can subtract one-third of the pages of each chapter to get a more accurate estimate of the information provided in each chapter. it also means that you will read roughly 100 pages of console output over the course of book. in the beginning i made an effort to do that but after a while this gets ridiculously boring and i began skipping most console output. there is a reason for the huge amount of console listings you are expected to read. the book is a cook book, not a compendium. throughout the book, you are basically told to 'enter and hit enter' or 'click menu x' and then they show the console listing of what output you can expect. between being told what to enter and output dumps to expect, there is little space left for any in-depth background discussion of what is actually going on. now, i learned to write code using these sorts of books and it worked out well for me so if you are at that stage of your professional life you might appreciate this writing style. i have moved on to prefer compendium style books though. another issue i noticed is probably the result of having different authors write individual chapters of the book seemingly without much coordination. the assumed skill level of the reader is confusing and non-linear. here is an example. at the beginning of chapter eight (exploitation using client-side attacks), the authors spend a whole paragraph explaining the x86 instruction nop starting with the phrase "nops are covered in detail in chapter 15 [in itself the funniest phrase of the book, nearly as absurd as my long-time favorite 'there aren't actually physical rings on the microchip' from greg hoglund's rootkit book], but we'll cover the basics here...". just a few pages later (and again in chapter 14), without explaining other x86 instructions before, the reader is expected to understand complete immunity debugger code listings. only in chapter 15 - after you were supposed to create your own exploits in chapter 14 - do the authors explain things like 'eip and esp registers' or 'the jmp instruction set'. the order of assumed and explained knowledge of x86 assembly code is completely out of whack. before starting the book i expected to read about internal in-depth information about the metasploit framework itself and less cook book style. this might have been a wrong assumption since it's the penetration tester's guide after all, not the contributor's guide. the good news is that the last few chapters kind of go into that direction and were more interesting to me. starting with chapter eight, the content of the chapters move away from pure usage of metasploit to extending metasploit. especially the chapters 14 and 15 about creating your own exploit and adding it as a module to the metasploit framework were enjoyable. let's take a closer look at those two chapters. in chapter 14, the authors explain how you can use metasploit as a fuzzer. the target of the chapter is a known vulnerable version of surgemail. once the fuzzer hits the expected crash, they walk you through the bug and instruct you how to control the seh chain to get to remote code execution and how to structure the shellcode. in the end, a new module is created to add this exploit to metasploit. at the beginning of chapter 15 - after writing a seh overwrite exploit - you finally learn about esp, eip, jmp and nop. afterwards the authors take an existing mailcarrier exploit written in python and port it to metasploit. even though i liked those two chapters i have to wonder whether both are necessary (they are really similar) or whether the order of the two chapters was supposed to be different at first. in general, while the first edition of the book is rocky, not all is lost for a second edition. the authors are clearly knowledgeable and touch upon large parts of the metasploit framework. it's just that they favored breadth over depth. my recommendation would be to find a way to seriously cut down on the console output listings to improve the flow of reading, to give more in-depth background knowledge instead of mostly cookbook style instructions (think of the ida pro book as a positive example), and to make a clear model of what skill level you are targeting in the reader. i think it is safe to assume that the average reader of a penetration testing book knows what a nop is. even more so after implementing a seh exploit earlier in the book. --> monday, june 20. 2011 release of swfretools 1.3.0 posted by sp in misc at 02:15 comments (0) trackbacks (0) release of swfretools 1.3.0 it's only been two weeks since i released version 1.2.0 of my swf reverse engineering tools collection swfretools and here is already the next version. this new version 1.3.0 focuses primarily on allowing users to pass command line arguments to flash dissector to do useful things like unpack compressed swf files or dump the content of swf files to stdout. the latter is very useful because it is easier to understand disassembled actionscript code when you have it in a real code editor instead of the (still) crude gui of flash dissector. here is an example of what the output of such a dump looks like. the official list of changes: feature: it is now possible to dump the content of a swf file to stdout by doing 'dissector.jar -dump '. feature: it is now possible to decompress swf files by doing 'dissector.jar -decompress -o '. feature: it is now possible to open files in swf dissector from the command line doing 'dissector.jar ... '. feature: function bodies defined by the actionscript 2 functions definefunction and definefunction2 are now aligned better in the gui to improve readability of the code. feature: individual elements of a swf file can now be dumped to a new file by right-clicking on the elements in the main tree of the gui. bugfix: fixed a bug in the minimizer that prevented it from working with compressed swf files. as usual you can download the swfretools from github. if you find bugs or want features to be added to the swfretools, please open issues on github. i am thankful for any kind of feedback i get. --> wednesday, june 8. 2011 release of swfretools 1.2.0 posted by sp in misc at 04:53 comments (0) trackbacks (0) release of swfretools 1.2.0 i have just made version 1.2.0 of my swf reverse engineering tools collection swfretools available for download. this release focused on improving the disassembly quality of actionscript 2 code after a user reported some issues last friday. specifically the changes i made are: - feature: made parsing of files more robust. this became necessary after the recent spike in obfuscated actionscript code malware. - feature: unknown actionscript 2 instructions are now shown in the gui with their action code. - feature: in actionscript 2 code, the jump target of actionif instructions shown in the gui is now the adjusted address instead of the raw relative address. this makes it easier for the user to find out where a jump is going. - feature: in actionscript 2 code, the jump target of actionjump instructions shown in the gui is now the adjusted address instead of the raw relative address. this makes it easier for the user to find out where a jump is going. - feature: strings defined in actionscript 2 constantpool actions are now surrounded by quotes to make them more readable. - feature: when actionscript 2 code is shown in the gui, registers pushed by actionpush are now easily distinguished from pushed integers. - feature: when actionscript 2 code is shown in the gui, constants pushed by actionpush are now easily distinguished from pushed integers. - feature: when actionscript 2 code is shown in the gui, strings pushed by actionpush are now easily distinguished from pushed integers. - bugfix: in previous versions, the actionscript 2 actions belonging to a doaction tag were not shown in the flash dissector tree. this has been fixed. - bugfix: in previous versions, the actionscript 2 actions belonging to a doinitaction tag were not shown in the flash dissector tree. this has been fixed. - bugfix: the constant list defined by an actionscript 2 constantpool instruction is now better formatted for improved readability. - bugfix: actionscript 2 push instructions were previously not shown in the gui. - bugfix: actionscript 2 pushduplicate instructions were previously not shown in the gui. - bugfix: actionscript 2 pop instructions were previously not shown in the gui. - bugfix: actionscript 2 play instructions were previously not shown in the gui. - bugfix: actionscript 2 previousframe instructions were previously not shown in the gui. - bugfix: actionscript 2 randomnumber instructions were previously not shown in the gui. - bugfix: actionscript 2 removesprite instructions were previously not shown in the gui. - bugfix: actionscript 2 return instructions were previously not shown in the gui. happy using and please use github to open tickets for problems or feature requests you encounter. or alternatively shoot me an email. --> monday, may 9. 2011 release of swfretools 1.1.0 posted by sp in misc at 05:44 comments (0) trackbacks (0) release of swfretools 1.1.0 two weeks ago i gave a presentation at source boston where i released a new collection of open-source tools for adobe flash swf file reverse engineering. i am developing these tools, called swfretools, to help reverse engineers like vulnerability researchers and malware analysts that have to deal with swf files regularly. today i have published version 1.1.0 of the swfretools on github for everyone to download. as of right now, the swfretools package contains three different tools. the most advanced tool is called flash dissector. it is a java-based gui tool you can use to inspect the binary content of swf files. the second tool is a java-based command-line tool called minimizer. this tool is useful for vulnerability researchers that have a swf file that crashes flash player and now they want to get rid of all parts of the swf file that are not related to the crash. the third tool is a primitive python-based debugger that can be used to hook and trace the flash player executable. flash dissector hex view showing the binary content of a swf file flash dissector code view showing actionscript 3 code in a swf file --> tuesday, april 26. 2011 data mining h-1b salary data posted by sp in misc at 04:12 comments (8) trackbacks (0) data mining h-1b salary data recently i became aware that all h-1b salary data is is publicly available on the internet. you can get a very detailed access database of the salary information and there is even a very nifty web application that allows you to quickly search for whatever salary data you are interested in. now, these figures are probably the best available resource for figuring out how your salary compares to that of your peers. unlike salary information from sites like glassdoor, this salary data is not self-reported but directly taken from h-1b visa proceedings making the salary figures much more truthful. i had already played around with the web application a few weeks ago and uncovered a few interesting pieces of data (mostly related to information security jobs, the field i am working in) which i posted on my twitter but until today i had not had time to actually do further analysis with the access database. the first thing i tried was to search for the highest average salaries in the database. i applied additional filters like only counting job titles for each company that had at least three granted h-1b visas for each listed position (to remove outliers like ceos on h-1b visas making millions of dollars, for example). i also aggregrated all statistics over the minimum salary specified for each position in the database. originally i wanted to work with the maximum salary field but apparently this field is optional and not many positions have it listed. still, i know that at least for my position (i am in the database too) the maximum salary field gives the amount of money i am really making. to make things simpler for me i also only considered salaries given per year and discarded those given per hour. continue reading "data mining h-1b salary data" --> saturday, march 12. 2011 cansecwest 2011 - day 3 posted by sp in misc at 02:25 comments (0) trackbacks (0) cansecwest 2011 - day 3 the third and last day of cansecwest 2011 is over. once again we started with talks at 9:00 am after a breakfast that was actually better than yesterday's (ask me about eating 8 slices of banana bread). as the official cansecwest party was yesterday, it was no surprise that only about half of the chairs were occupied for the first talk. fighting hard to get out of bed, i nearly missed the first talk myself. chris eng and brandon creighton of veracode were first to go up on stage. in the third cansecwest talk about an adobe product, they exposed many security issues in coldfusion web applications. at first they talked about the usual suspects like xss and sql injection and what these attacks look like in coldfusion code. then they went through a few other issues that are specific to coldfusion and not existant in other web application frameworks. for me, the funniest part was the incredible amount of variables that are supposed to be server side read-only but still writable by web applications. this has plenty of potential for all sorts of unintedend havoc. the second talk was about automated pointer analysis by my former co-worker vincenzo iozzo and his friend giovanni gola. they talked about doing interprocedural pointer analysis with the goal of automatically finding bugs like double-frees. after about five minutes in i got a work-related call that occupied me for the next half an hour. shortly after i had headed back into the conference room, the fire alarm went off. i already had recon 2010 flashbacks but fortunately it turned out to be a false alarm. i can't say i saw a lot about that talk, but i am sure it was good. the fourth and last talk about an adobe product came from richard johnson of sourcefire. he described some of the internals of the acrobat reader sandbox, that abstraction layer that was introduced in acrobat reader 10 to mitigate the effects of acrobat reader exploits. he also talked about some of the potential weaknesses in the sandbox, for example how the networking code and the filesystem code is not properly sandboxed, potentially allowing attackers to send file information over the network. more work-related issues made me miss much of the talk about fuzzing by dan kaminski, adam cechetti, and mike eddington. from what i saw they set their fuzzers on applications like ms office, openoffice, and acrobat reader and tried to draw conclusions about improvements in products security from the number of exploitable crashes (as determined by !exploitable) they got. the talk itself was pretty entertaining but the methodology they used to draw the conclusions did not always seem to be solid. several people asked very good question during the discussion after the talk. in the end, the speakers made their raw fuzzing results data available to everyone in the form of a sql dump. i did not see any more talks today as i had seen the microsoft talk about fuzzing last week at microsoft already. i also skipped the last talk because i really don't care enough about fuzzers to see another one of these talks. so, that is the end of cansecwest. the line-up this year was pretty fantastic and most of the usual suspects were there. as usual many people are heading up to whistler again this evening for the post-conference party weekend. not me, though. having done this in the last two years already, i actually want to see more of vancouver now. --> friday, march 11. 2011 cansecwest 2011 - day 2 posted by sp in misc at 03:43 comments (3) trackbacks (0) cansecwest 2011 - day 2 alright, i am back from day 2 of cansecwest. even though we started right at 9:00 am today, surprisingly many people made it to the conference room at the sheraton wall centre on time. i am detecting disturbing lacks of party dedication there. or maybe all these people were just like me hoping for a free breakfast. unfortunately, the free food provided by the hotel gets worse from year to year. anyway, let's take a quick look at the talks today as the line-up was amazingly strong today. the day started off with a talk about malware on gaming consoles and mobile devices by dongjoong ha and kichan ahn. they talked about what kind of network attacks are possible by owning some kind of always-connected gaming consoles. they also showed how malicious code can be injected in pirated software to build up botnet capabilities with the help of people that really, really need to get the latest super mario game for free. i really enjoyed the talk even though they did not really present new ideas. rather, they ported known techniques from older devices to game consoles. still, you can never be wrong talking about game consoles in front of a crowd of nerds. the second talk was called dynamic cryptographic trapdoors by eric filiol. that was the only talk i skipped. eric is a pretty smart guy and when he talks about cryptography it will fry my brain. i did not need this again. rather, i went outside to hack away for an hour on my flash re tools. after eric's talk i went back inside to see haifei li's talk about actionscript 3 vulnerabilities in flash. he focused on type confusion in the actionscript virtual machine caused by mismatches between what the actionscript code verifier verifies and what the actionscript jit compiler compiles and executes. due to my day job i have seen exactly that kind of bug roughly a million times already. still, haifei's talk was interesting and it is good to see what kind of work other people do on adobe stuff. after lunch (my food quality complaint still applies), andrea barisani and daniele bianco of inversepath talked about chip & pin cards which are very popular in europe. the talked a bit about the chip & pin standard, its weaknesses, and potential attack vectors. they also brought some surprisingly small skimming devices to show to the audience. even though this is not my kind of topic, the talk was the most interesting talk of the day. as part of their presentation, andrea and daniele produced a short movie that can only be described as legendary. i have already asked them to upload the video to youtube but unfortunately they did not warm up to that idea. the next talk was by ilja van sprundel. oh no, wait. when it was time for ilja's talk he was not to be found anywhere. instead, graeme neilson went on stage to give his talk first. graeme talked about different network devices like switches and how to install rootkits on them. as part of his research he took a look at 10 devices from different vendors like cisco, juniper, checkpoint, and others. he then gave three live demos of how fast he can put his own code onto those devices because of lacking code integrity checks by the network devices. afterwards it was finally ilja's time on stage. unlike the other speakers, he was not content with water. if the man wants beer, the man gets beer. he talked about iphone security issues but unlike many other researchers he did not focus on ios but rather on security vulnerabilities on the application level and the iphone standard library. stuff like cross-site scripting in default html components, format string vulnerabilities, or the misuse of the c-string functions. unfortunately, ilja was confused and surprised by the order and content of his own slides once in a while (see photo). then it was time for michael ossmann to give his talk about bluetooth hacking. i do not know anything about bluetooth or hardware hacking in general, so i can not comment on the content of the presentation. however, his slide set design was one of the best i have ever seen at a security conference and his speaking style was very pleasant too. the audience seemed entertained. the last talk of the day belonged to marc schoenefeld. it was a talk about finding font parser bugs with his fuzzer. most of the time when someone speaks about his awesome fuzzer at a con, he will not talk about the exploitable bugs he has found with it (because he has not found any). marc did the opposite. he described bug after bug he found in the font parsing engines of the major browsers and operating systems. i have never seen anybody give his talk as tiefenentspannt as he did. it was great. i can only come up with one word to summarize his talk: telephone. and now i am off to the tron-themed conference party! random observations of the day: - apple and blackberry tried to game the pwn2own rules by releasing os updates for their devices only days before the contest. then they sent their biggest nitpickers to the pwn2own people to make sure that new os version was used in the contest. this caused endless delays and much eye-rolling in the audience. all crocodile tears proved useless in the end and both the blackberry phone and the iphone fell as usual. no surprises there. more investment in security and less investment in lincoln-douglas courses might have helped. - google apparently does not have a single pr person here. why bother if your browser always survives pwn2own? - this is the first conference ever i am attending where my presence has literally no purpose. i am not giving a talk. i am not trying to connect with anyone. i am not giving product pitches or demos. i feel like i am a bum loitering around there. - did i mention the food quality already? --> thursday, march 10. 2011 cansecwest 2011 - day i posted by sp in misc at 02:41 comment (1) trackbacks (0) cansecwest 2011 - day i it's cansecwest time again. how do i know? this morning i woke up in a hotel room and when i looked outside it was pouring cats and dogs. usually when i wake up in a hotel room it is in a warm and sunny place. anyway, once again about 400 (i guess) people interested in computer security gathered in the sheraton wall centre in vancouver, canada to meet with friends, listen to amazing talks and make fun of hbgary. the conference started off very unusual. the agenda was on time. that's quite a change compared to the last few years. admittedly, the organizers moved the first talk to noon this year to make sure that everybody manages to recover from yesterday's conference dinner and karaoke bar. i had arrived early, at around 8 hoping to score some free breakfast which unfortunately did not happen today. i used the four hours to chat with old friends, some of which i was very surprised to meet here. at noon the talks started. the first talk was by brad woodberg of juniper. he talked about network application level firewalls. admittedly i know absolutely nothing about application firewalls, so i can not comment on the content of the talk. he is a pretty decent public speaker though. i enjoyed the talk. the second talk was by aaron portnoy and logan brown of hewlett-packard. they talked about their blackbox reverse engineering approach to the adobe shockwave player. they described what they did to triage crashes in fuzzed shockwave files having no knowledge at all about the shockwave file format. using binary instrumentation and a combination of windbg and python, they described how they were able to figure out the custom memory allocator of shockwave and other important shockwave internals. at 90 minutes, the talk was unusually long for cansecwest but worth every minute. they have also promised to make their tools available if people are interested. i will definitely follow up with them to make that happen. after this talk we had a lunch break and then pwn2own began. for the third year in a row, i ventured up to the pwn2own room to see what's going on. as usual, this is what happened: some guy sat down on a computer, pressed a few buttons on the computer, and then the hewlett-packard people declared him a winner and there was a round of applause. that's it. you don't get to see more if you are in the audience. if you have never been there and think the whole contest is more amazing, i am sorry to disappoint there. i only stayed for the apple safari ownage. the next talk i saw was about runtime firmware integrity checking by yves-alexis perez and loic duflot. this was a continuation of their talk they gave at cansecwest last year but this time they focused on the defensive side of firmware attacks. unfortunately both are not very good at public speaking. i left halfway through the talk to work on some things and talk to people outside the conference room. alright, now i am heading out to the conference party. the second day of cansecwest unfortunately starts at 9:00 in the morning. random observations of the first day: of all the vendor booths, google was by far the most popular one. it was packed with people stopping the whole day. only amazon managed to keep up with them. maybe it's because both companies gave away really quirky swag and their booths were staffed by people who looked like engineers. the opposite happened at the rapid7 booth which was pretty deserted for literally the whole day. that's what you get if you put two suits up there who could not look more like used car salesmen if they tried and you have marketing cards with dollar signs on your table instead of quirky swag. alex sotirov did live reviews of the talks he saw at http://research.phreedom.org/2011/cansecwest/ . i remember how he told me about this idea at ph-neutral last year but i never thought he would actually ever start doing it. google chrome survived the first day of pwn2own, much to my dismay. --> friday, march 4. 2011 release of jhexview 1.0 posted by sp at 05:20 comment (1) trackbacks (0) release of jhexview 1.0 six years ago i wrote a custom .net component for displaying binary data in a hex editor. a while later i discontinued the project as i left college and got a job at zynamics. the primary programming language we used at zynamics was java, so i pretty much stopped .net programming and switched over to java. i noticed that zynamics did not have a good hex view component for use in their reverse engineering applications so i quickly ported my nethex component from c# to java. originally i wanted to open-source jhexview immediately but then i figured that this component is so awesome that i do not want any potential competitors of zynamics to make use of it. since zynamics was bought by google this week, i can now finally open source the java component too. the component used in binnavi, pdf dissector, and hexer to display binary data from files and memory is now available to everyone on my github account. to see some screenshots you can check out this former post of mine. --> wednesday, march 2. 2011 writing file format parsers for ... posted by sp in misc at 06:34 comments (2) trackbacks (0) writing file format parsers for reverse engineering tools: insights from someone who does it too often during the last year i have implemented quite a few file format parsers for a variety of reverse engineering tools, some in the context of malware detection and others in the context of vulnerability analysis. i wrote file parsers for complex modern file formats like swf and pdf and for obscure file formats that are older than i and some that are nearly as old as my parents! in total i have written file format parsers for probably around 15 file formats and i have made some observations about the whole process i would like to share. continue reading "writing file format parsers for reverse engineering tools: insights from someone who does it too often" --> sunday, january 17. 2010 data sent home by ?torrent posted by sp in misc at 21:02 comments (10) trackbacks (0) data sent home by ?torrent last friday i was debugging random programs i found on my hard drive when i saw this:apparently ?torrent is sending lots of unrelated data back to the ?torrent servers when checking for program updates. i wanted to know what. google was not very helpful.?a thread in the official forum was all i found and that thread did not exactly have a lot of information. apparently i had to figure out things myself. unfortunately it turned out that ?torrent is sending a lot more data than can be seen in the screenshot so this little project took longer than originally planned. in fact i am only 90% done but i don't want to put any more time into this. one weekend is already too much time spent on this. so, here's what i figured out. continue reading "data sent home by ?torrent" --> tuesday, october 27. 2009 san francisco posted by sp in misc at 17:30 comments (0) trackbacks (0) san francisco i'll be on vacation in san francisco between november 4th and november 17th. if anybody wants to meet up there, please contact me in some way (see the side bar on the right hand side of this page). possible reasons for hanging out with me include but are not limited to:you work for a cool company and feel like showing me around your office.you work on a cool product/technology and feel like i should see it.you think i work on cool stuff and want to talk about it.you want to talk about reverse engineering, binary code analysis, hacking nes games or anything related to that.you want to get a binnavi product pitch.you want me to see some special place or event in san francisco. --> saturday, october 17. 2009 toad houses disassembled posted by sp in nes at 14:53 comments (11) trackbacks (0) toad houses disassembled to waste some time today i played some super mario bros 3 on my wii. i only made it trough three levels before i reached the first toad house. upon receiving the item from toad i decided to investigate something i've wanted to know for, i don't know, maybe 15 years. how exactly does the game decide what item you receive? i remember as a child that people playing super mario bros 3 did the weirdest stuff in toad houses to improve their item karma. running around, doing weird jumps, whatever.anyway, i really wanted to know when the game decides what item you receive and how it decides that. does the game already know what item you receive as soon as you enter the toad house? are the items placed in the boxes when you enter the toad house? does it do any other weird stuff? continue reading "toad houses disassembled" --> saturday, june 20. 2009 debugging emulated cisco devices ... posted by sp in work at 09:36 comments (0) trackbacks (0) debugging emulated cisco devices with binnavi good news from the binnavi front. for one, our gdb agent which connects binnavi with arbitrary gdb servers is now working on linux. since that was the last part of binnavi which had to be used from windows, all parts of binnavi are now usable from linux. even cooler news is that we have made the cisco router emulator dynamips work with the gdb agent. it is now possible for users of binnavi to use the gdb server of cisco devices emulated on dynamips. this has a wide range of applications for situations where people had to work with physical devices in the past even though dynamips would have been sufficient.out of the box, the gdb server of cisco devices is not emulated properly by dynamips. there were two issues that had to be fixed in the dynamips code:once the gdb server was active, the console of the cisco device froze and gdb would neither send nor accept commandsthe single-step flag was not honored by the emulator, making single-stepping impossiblei have created a patch that solves these two issues. you can download the patch file here. once this patch is applied to the dynamips source code, the gdb server of the cisco 2600 router i used for testing works like a charm and binnavi can use the gdb server for debugging the emulated device.here are some impressions of binnavi debugging the emulated cisco 2600 router.the first screenshot was taken shortly after attaching to the gdb server. you can see the "trap" instruction at offset 0x8021ccac. when you attach to the gdb server for the first time, this is where the debugger halts.then i single-stepped a few times to leave the function in the first screenshot. the second screenshot shows another smaller function where you end up after leaving the first function.the third screenshot shows a bigger function. in this function i told binnavi to record all basic blocks which are ever executed and then i resumed the debugger. the result can be seen in the trace log in the lower part of the window. the address of each basic block hit during execution is shown there in the order in which the basic blocks were hit. double-clicking on the trace selects all basic blocks that were hit in the graph. this makes it very easy to get a quick code coverage analysis to see what basic blocks were executed and those that were not. --> « previous page   (page 1 of 10, totaling 137 entries)   next page » calendar february '17 mon tue wed thu fri sat sun     1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28           quicksearch archives february 2017 january 2017 december 2016 november 2016 october 2016 september 2016 august 2016 july 2016 june 2016 may 2016 recent... older... contact 142691645 riijngoud lambdacube sporst links blogs add / xor / rol top exits www.the-interweb.com (284) en.wikipedia.org (275) www.slideshare.net (93) www.amazon.com (56) the-interweb.com (36) www.zynamics.com (34) www.offensive-security.com (29) nostarch.com (26) www.onlamp.com (22) github.com (21) syndicate this blog rss 0.91 feed rss 1.0 feed rss 2.0 feed atom 0.3 feed atom 1.0 feed rss 2.0 comments blog administration open login screen powered by categories book reviews hexer ida malware misc nes faxanadu fceuxd sp pelib work all categories powered by s9y - design by carl


Here you find all texts from your page as Google (googlebot) and others search engines seen it.

Words density analysis:

Numbers of all words: 7052

One word

Two words phrases

Three words phrases

the - 7.16% (505)
and - 2.01% (142)
for - 1.57% (111)
out - 1.25% (88)
all - 1.05% (74)
you - 1.01% (71)
that - 0.96% (68)
his - 0.95% (67)
not - 0.95% (67)
are - 0.88% (62)
talk - 0.88% (62)
was - 0.81% (57)
this - 0.77% (54)
use - 0.72% (51)
day - 0.71% (50)
about - 0.69% (49)
now - 0.69% (49)
can - 0.65% (46)
age - 0.64% (45)
own - 0.61% (43)
pro - 0.6% (42)
game - 0.6% (42)
too - 0.6% (42)
here - 0.57% (40)
how - 0.57% (40)
action - 0.55% (39)
file - 0.54% (38)
with - 0.52% (37)
one - 0.52% (37)
read - 0.52% (37)
our - 0.5% (35)
they - 0.47% (33)
ins - 0.47% (33)
have - 0.47% (33)
app - 0.45% (32)
tool - 0.45% (32)
ever - 0.45% (32)
from - 0.44% (31)
like - 0.44% (31)
end - 0.44% (31)
work - 0.44% (31)
code - 0.44% (31)
what - 0.43% (30)
actions - 0.43% (30)
swf - 0.43% (30)
bug - 0.43% (30)
some - 0.4% (28)
actionscript - 0.38% (27)
were - 0.37% (26)
data - 0.37% (26)
get - 0.37% (26)
but - 0.37% (26)
any - 0.35% (25)
page - 0.35% (25)
see - 0.35% (25)
gui - 0.35% (25)
tools - 0.35% (25)
show - 0.35% (25)
back - 0.35% (25)
book - 0.34% (24)
chapter - 0.31% (22)
form - 0.31% (22)
very - 0.31% (22)
able - 0.31% (22)
(0) - 0.31% (22)
star - 0.3% (21)
pages - 0.3% (21)
there - 0.28% (20)
time - 0.28% (20)
know - 0.28% (20)
more - 0.28% (20)
metasploit - 0.27% (19)
first - 0.27% (19)
after - 0.27% (19)
post - 0.27% (19)
comment - 0.27% (19)
instruct - 0.26% (18)
format - 0.26% (18)
thing - 0.26% (18)
2011 - 0.26% (18)
play - 0.24% (17)
put - 0.24% (17)
games - 0.24% (17)
free - 0.24% (17)
other - 0.24% (17)
shown - 0.24% (17)
instruction - 0.24% (17)
people - 0.23% (16)
posted - 0.23% (16)
two - 0.23% (16)
only - 0.23% (16)
used - 0.23% (16)
cheat - 0.23% (16)
per - 0.23% (16)
want - 0.23% (16)
eng - 0.23% (16)
cansecwest - 0.23% (16)
old - 0.21% (15)
feature - 0.21% (15)
man - 0.21% (15)
trackbacks - 0.21% (15)
did - 0.21% (15)
had - 0.21% (15)
device - 0.21% (15)
--> - 0.21% (15)
year - 0.21% (15)
off - 0.21% (15)
pages), - 0.21% (15)
engine - 0.21% (15)
your - 0.2% (14)
exploit - 0.2% (14)
way - 0.2% (14)
over - 0.2% (14)
its - 0.2% (14)
comments - 0.2% (14)
when - 0.2% (14)
their - 0.2% (14)
last - 0.2% (14)
cisco - 0.18% (13)
make - 0.18% (13)
content - 0.18% (13)
flash - 0.18% (13)
swfretools - 0.18% (13)
part - 0.18% (13)
salary - 0.18% (13)
view - 0.18% (13)
fun - 0.18% (13)
even - 0.18% (13)
feature: - 0.18% (13)
instructions - 0.18% (13)
devices - 0.18% (13)
each - 0.18% (13)
start - 0.17% (12)
open - 0.17% (12)
who - 0.17% (12)
misc - 0.17% (12)
real - 0.17% (12)
knight - 0.17% (12)
previous - 0.17% (12)
files - 0.17% (12)
dissector - 0.17% (12)
has - 0.17% (12)
bugfix: - 0.17% (12)
also - 0.17% (12)
muffin - 0.17% (12)
already - 0.17% (12)
gdb - 0.16% (11)
application - 0.16% (11)
push - 0.16% (11)
here. - 0.16% (11)
binnavi - 0.16% (11)
release - 0.16% (11)
layer - 0.16% (11)
side - 0.16% (11)
rest - 0.16% (11)
console - 0.16% (11)
add - 0.16% (11)
new - 0.16% (11)
it. - 0.16% (11)
shed - 0.16% (11)
on. - 0.16% (11)
which - 0.14% (10)
engineering - 0.14% (10)
function - 0.14% (10)
few - 0.14% (10)
reverse - 0.14% (10)
list - 0.14% (10)
though - 0.14% (10)
basic - 0.14% (10)
player - 0.14% (10)
server - 0.14% (10)
round - 0.14% (10)
then - 0.14% (10)
talked - 0.14% (10)
made - 0.14% (10)
log - 0.14% (10)
source - 0.14% (10)
really - 0.14% (10)
nes - 0.14% (10)
conference - 0.14% (10)
chapters - 0.14% (10)
usual - 0.14% (10)
call - 0.14% (10)
san - 0.13% (9)
them - 0.13% (9)
hex - 0.13% (9)
pack - 0.13% (9)
level - 0.13% (9)
mati - 0.13% (9)
look - 0.13% (9)
security - 0.13% (9)
fri - 0.13% (9)
me. - 0.13% (9)
version - 0.13% (9)
it's - 0.13% (9)
issue - 0.13% (9)
been - 0.13% (9)
most - 0.13% (9)
freemium - 0.13% (9)
single - 0.13% (9)
every - 0.13% (9)
just - 0.13% (9)
gui. - 0.13% (9)
lack - 0.13% (9)
where - 0.13% (9)
possible - 0.13% (9)
previously - 0.11% (8)
issues - 0.11% (8)
toad - 0.11% (8)
into - 0.11% (8)
fortunately - 0.11% (8)
port - 0.11% (8)
output - 0.11% (8)
point - 0.11% (8)
web - 0.11% (8)
long - 0.11% (8)
pin - 0.11% (8)
2016 - 0.11% (8)
search - 0.11% (8)
database - 0.11% (8)
today - 0.11% (8)
car - 0.11% (8)
wed - 0.11% (8)
kind - 0.11% (8)
thu - 0.11% (8)
eating - 0.11% (8)
these - 0.11% (8)
screen - 0.11% (8)
pretty - 0.11% (8)
reader - 0.11% (8)
sent - 0.11% (8)
second - 0.11% (8)
talks - 0.11% (8)
think - 0.11% (8)
cut - 0.1% (7)
give - 0.1% (7)
down - 0.1% (7)
penetration - 0.1% (7)
tag - 0.1% (7)
screenshot - 0.1% (7)
third - 0.1% (7)
available - 0.1% (7)
using - 0.1% (7)
things - 0.1% (7)
because - 0.1% (7)
again - 0.1% (7)
much - 0.1% (7)
authors - 0.1% (7)
h-1b - 0.1% (7)
marc - 0.1% (7)
right - 0.1% (7)
... - 0.1% (7)
dump - 0.1% (7)
good - 0.1% (7)
parser - 0.1% (7)
week - 0.1% (7)
may - 0.1% (7)
does - 0.1% (7)
torrent - 0.1% (7)
lot - 0.1% (7)
would - 0.1% (7)
actually - 0.1% (7)
enter - 0.1% (7)
while - 0.1% (7)
1.0 - 0.1% (7)
component - 0.1% (7)
information - 0.1% (7)
unfortunately - 0.1% (7)
program - 0.1% (7)
pwn2own - 0.09% (6)
stars - 0.09% (6)
day. - 0.09% (6)
figure - 0.09% (6)
found - 0.09% (6)
feed - 0.09% (6)
fuzzer - 0.09% (6)
jump - 0.09% (6)
once - 0.09% (6)
cover - 0.09% (6)
around - 0.09% (6)
still - 0.09% (6)
?torrent - 0.09% (6)
pushed - 0.09% (6)
years - 0.09% (6)
2.0 - 0.09% (6)
analysis - 0.09% (6)
room - 0.09% (6)
parsers - 0.09% (6)
item - 0.09% (6)
emulated - 0.09% (6)
binary - 0.09% (6)
stuff - 0.09% (6)
related - 0.09% (6)
save - 0.09% (6)
ida - 0.09% (6)
rid - 0.09% (6)
is. - 0.09% (6)
network - 0.09% (6)
dynamips - 0.09% (6)
tie - 0.09% (6)
less - 0.09% (6)
van - 0.09% (6)
seen - 0.09% (6)
line - 0.09% (6)
mon - 0.09% (6)
than - 0.09% (6)
product - 0.09% (6)
instead - 0.09% (6)
review - 0.09% (6)
started - 0.09% (6)
attack - 0.09% (6)
framework - 0.09% (6)
table - 0.09% (6)
java - 0.09% (6)
cheats - 0.09% (6)
ago - 0.09% (6)
different - 0.09% (6)
those - 0.09% (6)
github - 0.09% (6)
zynamics - 0.09% (6)
sat - 0.09% (6)
doing - 0.09% (6)
find - 0.09% (6)
march - 0.07% (5)
many - 0.07% (5)
phone - 0.07% (5)
debugging - 0.07% (5)
example - 0.07% (5)
raw - 0.07% (5)
malware - 0.07% (5)
reading - 0.07% (5)
adobe - 0.07% (5)
continue - 0.07% (5)
whole - 0.07% (5)
check - 0.07% (5)
next - 0.07% (5)
improve - 0.07% (5)
download - 0.07% (5)
both - 0.07% (5)
in-game - 0.07% (5)
that's - 0.07% (5)
take - 0.07% (5)
move - 0.07% (5)
before - 0.07% (5)
shockwave - 0.07% (5)
explain - 0.07% (5)
user - 0.07% (5)
hack - 0.07% (5)
cheating - 0.07% (5)
address - 0.07% (5)
google - 0.07% (5)
wanted - 0.07% (5)
dissector. - 0.07% (5)
listing - 0.07% (5)
applications - 0.07% (5)
since - 0.07% (5)
set - 0.07% (5)
feel - 0.07% (5)
cool - 0.07% (5)
patch - 0.07% (5)
never - 0.07% (5)
top - 0.07% (5)
will - 0.07% (5)
string - 0.07% (5)
'the - 0.07% (5)
focus - 0.07% (5)
went - 0.07% (5)
quick - 0.07% (5)
described - 0.07% (5)
potential - 0.07% (5)
tools, - 0.07% (5)
wrote - 0.07% (5)
hit - 0.07% (5)
there. - 0.07% (5)
now, - 0.07% (5)
three - 0.07% (5)
don't - 0.07% (5)
writing - 0.07% (5)
having - 0.07% (5)
wall - 0.07% (5)
party - 0.07% (5)
could - 0.07% (5)
interested - 0.07% (5)
itch - 0.07% (5)
going - 0.07% (5)
talk. - 0.07% (5)
block - 0.07% (5)
research - 0.07% (5)
saw - 0.07% (5)
fast - 0.07% (5)
style - 0.07% (5)
might - 0.06% (4)
send - 0.06% (4)
command - 0.06% (4)
need - 0.06% (4)
hour - 0.06% (4)
1.2.0 - 0.06% (4)
game. - 0.06% (4)
acrobat - 0.06% (4)
june - 0.06% (4)
maybe - 0.06% (4)
guide - 0.06% (4)
database. - 0.06% (4)
fire - 0.06% (4)
saturday, - 0.06% (4)
help - 0.06% (4)
one. - 0.06% (4)
everything - 0.06% (4)
break - 0.06% (4)
reach - 0.06% (4)
recent - 0.06% (4)
change - 0.06% (4)
sure - 0.06% (4)
constant - 0.06% (4)
are. - 0.06% (4)
bugs - 0.06% (4)
blocks - 0.06% (4)
starting - 0.06% (4)
working - 0.06% (4)
fixed - 0.06% (4)
code. - 0.06% (4)
expansion - 0.06% (4)
ilja - 0.06% (4)
gave - 0.06% (4)
called - 0.06% (4)
consoles - 0.06% (4)
open-source - 0.06% (4)
days - 0.06% (4)
time. - 0.06% (4)
card - 0.06% (4)
number - 0.06% (4)
anybody - 0.06% (4)
disassembled - 0.06% (4)
vulnerability - 0.06% (4)
decide - 0.06% (4)
receive - 0.06% (4)
official - 0.06% (4)
tried - 0.06% (4)
present - 0.06% (4)
interesting - 0.06% (4)
making - 0.06% (4)
listings - 0.06% (4)
computer - 0.06% (4)
random - 0.06% (4)
testing - 0.06% (4)
knowledge - 0.06% (4)
order - 0.06% (4)
francisco - 0.06% (4)
esp - 0.06% (4)
attacks - 0.06% (4)
debugger - 0.06% (4)
module - 0.06% (4)
complete - 0.06% (4)
job - 0.06% (4)
expected - 0.06% (4)
position - 0.06% (4)
told - 0.06% (4)
apparently - 0.06% (4)
ported - 0.06% (4)
rss - 0.06% (4)
hard - 0.06% (4)
nop - 0.06% (4)
surprise - 0.06% (4)
stage - 0.06% (4)
friday - 0.06% (4)
amount - 0.06% (4)
field - 0.06% (4)
exploits - 0.06% (4)
joy - 0.06% (4)
blog - 0.06% (4)
roughly - 0.06% (4)
houses - 0.06% (4)
in. - 0.06% (4)
friend - 0.06% (4)
outs - 0.06% (4)
public - 0.06% (4)
happen - 0.06% (4)
through - 0.06% (4)
target - 0.06% (4)
originally - 0.06% (4)
audience - 0.06% (4)
gui, - 0.04% (3)
9:00 - 0.04% (3)
connect - 0.04% (3)
got - 0.04% (3)
coldfusion - 0.04% (3)
hotel - 0.04% (3)
food - 0.04% (3)
breakfast - 0.04% (3)
mining - 0.04% (3)
came - 0.04% (3)
still, - 0.04% (3)
exactly - 0.04% (3)
super - 0.04% (3)
outside - 0.04% (3)
front - 0.04% (3)
integers. - 0.04% (3)
older - 0.04% (3)
distinguished - 0.04% (3)
easily - 0.04% (3)
showing - 0.04% (3)
actionpush - 0.04% (3)
half - 0.04% (3)
crashes - 0.04% (3)
iphone - 0.04% (3)
meet - 0.04% (3)
bit - 0.04% (3)
unlike - 0.04% (3)
fuzzing - 0.04% (3)
researchers - 0.04% (3)
eric - 0.04% (3)
amazing - 0.04% (3)
visa - 0.04% (3)
short - 0.04% (3)
everyone - 0.04% (3)
exploitable - 0.04% (3)
me, - 0.04% (3)
audience. - 0.04% (3)
hacking - 0.04% (3)
someone - 0.04% (3)
pop - 0.04% (3)
slide - 0.04% (3)
always - 0.04% (3)
seem - 0.04% (3)
presentation - 0.04% (3)
mario - 0.04% (3)
during - 0.04% (3)
1.1.0 - 0.04% (3)
speaker - 0.04% (3)
rather - 0.04% (3)
anyway, - 0.04% (3)
vulnerabilities - 0.04% (3)
observations - 0.04% (3)
dan - 0.04% (3)
trace - 0.04% (3)
programming - 0.04% (3)
chip - 0.04% (3)
individual - 0.04% (3)
book. - 0.04% (3)
november - 0.04% (3)
bar - 0.04% (3)
small - 0.04% (3)
place - 0.04% (3)
basics - 0.04% (3)
live - 0.04% (3)
gets - 0.04% (3)
four - 0.04% (3)
written - 0.04% (3)
weird - 0.04% (3)
tester's - 0.04% (3)
reviews - 0.04% (3)
easy - 0.04% (3)
general - 0.04% (3)
beginning - 0.04% (3)
2009 - 0.04% (3)
this. - 0.04% (3)
probably - 0.04% (3)
nearly - 0.04% (3)
itself - 0.04% (3)
home - 0.04% (3)
x86 - 0.04% (3)
eight - 0.04% (3)
skill - 0.04% (3)
result - 0.04% (3)
another - 0.04% (3)
pressed - 0.04% (3)
though. - 0.04% (3)
write - 0.04% (3)
in-depth - 0.04% (3)
left - 0.04% (3)
october - 0.04% (3)
between - 0.04% (3)
book, - 0.04% (3)
noticed - 0.04% (3)
problem - 0.04% (3)
formats - 0.04% (3)
usually - 0.04% (3)
mine - 0.04% (3)
literally - 0.04% (3)
fact - 0.04% (3)
games. - 0.04% (3)
quite - 0.04% (3)
unlock - 0.04% (3)
purchase - 0.04% (3)
sun - 0.04% (3)
currency - 0.04% (3)
due - 0.04% (3)
completely - 0.04% (3)
$2.99 - 0.04% (3)
single-player - 0.04% (3)
january - 0.04% (3)
wednesday, - 0.04% (3)
rol - 0.04% (3)
later - 0.04% (3)
router - 0.04% (3)
moral - 0.04% (3)
box, - 0.04% (3)
getting - 0.04% (3)
single-step - 0.04% (3)
let's - 0.04% (3)
access - 0.04% (3)
clear - 0.04% (3)
developers - 0.04% (3)
sort - 0.04% (3)
tue - 0.04% (3)
end, - 0.04% (3)
memory - 0.04% (3)
means - 0.04% (3)
looked - 0.04% (3)
modify - 0.04% (3)
playing - 0.04% (3)
money - 0.04% (3)
rings - 0.04% (3)
cook - 0.04% (3)
finally - 0.04% (3)
easier - 0.04% (3)
github. - 0.04% (3)
project - 0.04% (3)
news - 0.04% (3)
away - 0.04% (3)
metasploit. - 0.04% (3)
parts - 0.04% (3)
tree - 0.04% (3)
known - 0.04% (3)
seh - 0.04% (3)
assume - 0.04% (3)
better - 0.04% (3)
collection - 0.04% (3)
defined - 0.04% (3)
dollar - 0.04% (3)
'dissector.jar - 0.04% (3)
file> - 0.04% (3)
python - 0.04% (3)
booth - 0.04% (3)
please - 0.04% (3)
wonder - 0.04% (3)
.net - 0.04% (3)
create - 0.04% (3)
code, - 0.04% (3)
weeks - 0.04% (3)
1.3.0 - 0.04% (3)
focused - 0.04% (3)
understand - 0.04% (3)
supposed - 0.04% (3)
quality - 0.04% (3)
useful - 0.04% (3)
internal - 0.04% (3)
idea - 0.04% (3)
jhexview - 0.04% (3)
makes - 0.04% (3)
contest - 0.04% (3)
works - 0.03% (2)
remember - 0.03% (2)
2600 - 0.03% (2)
integrity - 0.03% (2)
executed - 0.03% (2)
html - 0.03% (2)
wants - 0.03% (2)
combination - 0.03% (2)
function. - 0.03% (2)
alex - 0.03% (2)
attach - 0.03% (2)
standard - 0.03% (2)
demos - 0.03% (2)
scripting - 0.03% (2)
shows - 0.03% (2)
browser - 0.03% (2)
took - 0.03% (2)
amazon - 0.03% (2)
cards - 0.03% (2)
hewlett-packard - 0.03% (2)
popular - 0.03% (2)
powered - 0.03% (2)
atom - 0.03% (2)
firmware - 0.03% (2)
checking - 0.03% (2)
vendor - 0.03% (2)
follow - 0.03% (2)
the-interweb.com - 0.03% (2)
far - 0.03% (2)
custom - 0.03% (2)
quirky - 0.03% (2)
rapid7 - 0.03% (2)
warm - 0.03% (2)
2017 - 0.03% (2)
swag - 0.03% (2)
booths - 0.03% (2)
opposite - 0.03% (2)
february - 0.03% (2)
ilja's - 0.03% (2)
happened - 0.03% (2)
10, - 0.03% (2)
graeme - 0.03% (2)
them. - 0.03% (2)
coverage - 0.03% (2)
nor - 0.03% (2)
linux. - 0.03% (2)
dynamips. - 0.03% (2)
servers - 0.03% (2)
day: - 0.03% (2)
years. - 0.03% (2)
apple - 0.03% (2)
blackberry - 0.03% (2)
insights - 0.03% (2)
friends, - 0.03% (2)
updates - 0.03% (2)
out. - 0.03% (2)
weekend - 0.03% (2)
often - 0.03% (2)
forum - 0.03% (2)
contest. - 0.03% (2)
thread - 0.03% (2)
sending - 0.03% (2)
tools: - 0.03% (2)
context - 0.03% (2)
detection - 0.03% (2)
proved - 0.03% (2)
morning - 0.03% (2)
daniele - 0.03% (2)
17. - 0.03% (2)
share. - 0.03% (2)
(1) - 0.03% (2)
usual. - 0.03% (2)
process - 0.03% (2)
investment - 0.03% (2)
others - 0.03% (2)
total - 0.03% (2)
noon - 0.03% (2)
contact - 0.03% (2)
surprised - 0.03% (2)
speaking - 0.03% (2)
slides - 0.03% (2)
(see - 0.03% (2)
emulator - 0.03% (2)
bluetooth - 0.03% (2)
anything - 0.03% (2)
giving - 0.03% (2)
agent - 0.03% (2)
house? - 0.03% (2)
design - 0.03% (2)
that. - 0.03% (2)
zynamics. - 0.03% (2)
decides - 0.03% (2)
java. - 0.03% (2)
too. - 0.03% (2)
screenshots - 0.03% (2)
child - 0.03% (2)
figured - 0.03% (2)
admittedly - 0.03% (2)
pdf - 0.03% (2)
bros - 0.03% (2)
font - 0.03% (2)
hexer - 0.03% (2)
event - 0.03% (2)
awesome - 0.03% (2)
special - 0.03% (2)
it.you - 0.03% (2)
display - 0.03% (2)
include - 0.03% (2)
computer, - 0.03% (2)
functions - 0.03% (2)
andrea - 0.03% (2)
reason - 0.03% (2)
explaining - 0.03% (2)
assumed - 0.03% (2)
without - 0.03% (2)
compendium - 0.03% (2)
moved - 0.03% (2)
style. - 0.03% (2)
books - 0.03% (2)
sorts - 0.03% (2)
discussion - 0.03% (2)
background - 0.03% (2)
little - 0.03% (2)
began - 0.03% (2)
covered - 0.03% (2)
course - 0.03% (2)
provided - 0.03% (2)
one-third - 0.03% (2)
chapter. - 0.03% (2)
high - 0.03% (2)
'meterpreter - 0.03% (2)
(28 - 0.03% (2)
(12 - 0.03% (2)
(10 - 0.03% (2)
(18 - 0.03% (2)
(22 - 0.03% (2)
phrase - 0.03% (2)
detail - 0.03% (2)
'metasploit - 0.03% (2)
afterwards - 0.03% (2)
monday, - 0.03% (2)
average - 0.03% (2)
safe - 0.03% (2)
mostly - 0.03% (2)
large - 0.03% (2)
upon - 0.03% (2)
edition - 0.03% (2)
general, - 0.03% (2)
first. - 0.03% (2)
necessary - 0.03% (2)
whether - 0.03% (2)
learn - 0.03% (2)
funniest - 0.03% (2)
created - 0.03% (2)
structure - 0.03% (2)
execution - 0.03% (2)
fuzzer. - 0.03% (2)
creating - 0.03% (2)
wrong - 0.03% (2)
assembly - 0.03% (2)
jmp - 0.03% (2)
rootkit - 0.03% (2)
greg - 0.03% (2)
physical - 0.03% (2)
(20 - 0.03% (2)
absolute - 0.03% (2)
released - 0.03% (2)
social - 0.03% (2)
wondering - 0.03% (2)
running - 0.03% (2)
plenty - 0.03% (2)
why - 0.03% (2)
yet - 0.03% (2)
nothing - 0.03% (2)
windows - 0.03% (2)
extra - 0.03% (2)
(the - 0.03% (2)
trainers - 0.03% (2)
considered - 0.03% (2)
buy - 0.03% (2)
such - 0.03% (2)
success - 0.03% (2)
extend - 0.03% (2)
allowed - 0.03% (2)
knows - 0.03% (2)
hand - 0.03% (2)
points. - 0.03% (2)
health - 0.03% (2)
players - 0.03% (2)
android - 0.03% (2)
bought - 0.03% (2)
(2) - 0.03% (2)
days, - 0.03% (2)
paid - 0.03% (2)
aim - 0.03% (2)
disturbing - 0.03% (2)
know, - 0.03% (2)
before, - 0.03% (2)
worked - 0.03% (2)
starch - 0.03% (2)
recently - 0.03% (2)
review: - 0.03% (2)
august - 0.03% (2)
problems - 0.03% (2)
deal - 0.03% (2)
what's - 0.03% (2)
theme - 0.03% (2)
keep - 0.03% (2)
content? - 0.03% (2)
site. - 0.03% (2)
something - 0.03% (2)
piece - 0.03% (2)
closest - 0.03% (2)
category - 0.03% (2)
basically - 0.03% (2)
fish - 0.03% (2)
grind - 0.03% (2)
similar - 0.03% (2)
tap - 0.03% (2)
island - 0.03% (2)
paradise - 0.03% (2)
20. - 0.03% (2)
allowing - 0.03% (2)
lunch - 0.03% (2)
sandbox, - 0.03% (2)
microsoft - 0.03% (2)
speakers - 0.03% (2)
asked - 0.03% (2)
(as - 0.03% (2)
conclusions - 0.03% (2)
draw - 0.03% (2)
office, - 0.03% (2)
fuzzers - 0.03% (2)
miss - 0.03% (2)
properly - 0.03% (2)
weaknesses - 0.03% (2)
internals - 0.03% (2)
skipped - 0.03% (2)
turned - 0.03% (2)
2010 - 0.03% (2)
alarm - 0.03% (2)
shortly - 0.03% (2)
work-related - 0.03% (2)
minutes - 0.03% (2)
finding - 0.03% (2)
former - 0.03% (2)
pointer - 0.03% (2)
specific - 0.03% (2)
sql - 0.03% (2)
already. - 0.03% (2)
so, - 0.03% (2)
applications. - 0.03% (2)
today. - 0.03% (2)
times - 0.03% (2)
million - 0.03% (2)
caused - 0.03% (2)
haifei - 0.03% (2)
again. - 0.03% (2)
guy - 0.03% (2)
rather, - 0.03% (2)
enjoyed - 0.03% (2)
build - 0.03% (2)
consoles. - 0.03% (2)
gaming - 0.03% (2)
worse - 0.03% (2)
cansecwest. - 0.03% (2)
unfortunately, - 0.03% (2)
hoping - 0.03% (2)
centre - 0.03% (2)
sheraton - 0.03% (2)
surprisingly - 0.03% (2)
alright, - 0.03% (2)
friday, - 0.03% (2)
vancouver - 0.03% (2)
done - 0.03% (2)
heading - 0.03% (2)
line-up - 0.03% (2)
suspects - 0.03% (2)
stage. - 0.03% (2)
users - 0.03% (2)
download. - 0.03% (2)
registers - 0.03% (2)
constantpool - 0.03% (2)
strings - 0.03% (2)
going. - 0.03% (2)
address. - 0.03% (2)
relative - 0.03% (2)
adjusted - 0.03% (2)
became - 0.03% (2)
parsing - 0.03% (2)
changes - 0.03% (2)
reported - 0.03% (2)
swfretools, - 0.03% (2)
belonging - 0.03% (2)
files. - 0.03% (2)
minimizer - 0.03% (2)
elements - 0.03% (2)
readability - 0.03% (2)
definefunction - 0.03% (2)
decompress - 0.03% (2)
file>'. - 0.03% (2)
- 0.03% (2)
stdout - 0.03% (2)
editor - 0.03% (2)
compressed - 0.03% (2)
versions, - 0.03% (2)
tree. - 0.03% (2)
myself. - 0.03% (2)
company - 0.03% (2)
occupied - 0.03% (2)
yesterday's - 0.03% (2)
"data - 0.03% (2)
hour. - 0.03% (2)
given - 0.03% (2)
optional - 0.03% (2)
maximum - 0.03% (2)
remove - 0.03% (2)
listed - 0.03% (2)
visas - 0.03% (2)
least - 0.03% (2)
applied - 0.03% (2)
fixed. - 0.03% (2)
salaries - 0.03% (2)
played - 0.03% (2)
taken - 0.03% (2)
best - 0.03% (2)
figures - 0.03% (2)
whatever - 0.03% (2)
quickly - 0.03% (2)
tuesday, - 0.03% (2)
java-based - 0.03% (2)
tools. - 0.03% (2)
engineers - 0.03% (2)
email. - 0.03% (2)
categories - 0.03% (2)
in the - 0.81% (57)
of the - 0.67% (47)
to the - 0.3% (21)
actionscript 2 - 0.28% (20)
at the - 0.26% (18)
i have - 0.26% (18)
shown in - 0.23% (16)
the gui - 0.23% (16)
trackbacks (0) - 0.21% (15)
on the - 0.21% (15)
posted by - 0.21% (15)
the first - 0.21% (15)
swf file - 0.18% (13)
the talk - 0.18% (13)
you can - 0.17% (12)
and the - 0.17% (12)
for the - 0.17% (12)
muffin knight - 0.17% (12)
misc at - 0.16% (11)
with the - 0.16% (11)
- bugfix: - 0.16% (11)
talk about - 0.16% (11)
in misc - 0.16% (11)
not shown - 0.14% (10)
file format - 0.13% (9)
did not - 0.13% (9)
to see - 0.13% (9)
talked about - 0.13% (9)
it was - 0.13% (9)
the gui. - 0.13% (9)
reverse engineering - 0.13% (9)
the book - 0.13% (9)
is now - 0.13% (9)
of swf - 0.11% (8)
to make - 0.11% (8)
content of - 0.11% (8)
the game - 0.11% (8)
to get - 0.11% (8)
here is - 0.11% (8)
were previously - 0.11% (8)
have a - 0.11% (8)
- feature: - 0.11% (8)
talk was - 0.11% (8)
previously not - 0.11% (8)
gdb server - 0.11% (8)
instructions were - 0.11% (8)
release of - 0.11% (8)
bugfix: actionscript - 0.11% (8)
kind of - 0.11% (8)
the gdb - 0.11% (8)
about the - 0.11% (8)
flash dissector - 0.1% (7)
the second - 0.1% (7)
what the - 0.1% (7)
are now - 0.1% (7)
comments (0) - 0.1% (7)
cansecwest 2011 - 0.1% (7)
(0) trackbacks - 0.1% (7)
by the - 0.1% (7)
the last - 0.1% (7)
gui. - - 0.1% (7)
after a - 0.09% (6)
2 code - 0.09% (6)
swf files - 0.09% (6)
the actionscript - 0.09% (6)
of swfretools - 0.09% (6)
even though - 0.09% (6)
parsers for - 0.09% (6)
you are - 0.09% (6)
what i - 0.09% (6)
if you - 0.09% (6)
2011 - - 0.09% (6)
as the - 0.09% (6)
save game - 0.09% (6)
want to - 0.09% (6)
salary data - 0.09% (6)
thing i - 0.09% (6)
can be - 0.07% (5)
there is - 0.07% (5)
wanted to - 0.07% (5)
format parsers - 0.07% (5)
the third - 0.07% (5)
the content - 0.07% (5)
the metasploit - 0.07% (5)
your own - 0.07% (5)
how to - 0.07% (5)
is not - 0.07% (5)
the end - 0.07% (5)
from the - 0.07% (5)
instead of - 0.07% (5)
his talk - 0.07% (5)
web application - 0.07% (5)
in chapter - 0.07% (5)
that are - 0.07% (5)
the authors - 0.07% (5)
that i - 0.07% (5)
of what - 0.07% (5)
of this - 0.07% (5)
to that - 0.07% (5)
code is - 0.07% (5)
the conference - 0.07% (5)
part of - 0.06% (4)
the order - 0.06% (4)
the next - 0.06% (4)
they talked - 0.06% (4)
continue reading - 0.06% (4)
was the - 0.06% (4)
talk i - 0.06% (4)
was not - 0.06% (4)
had to - 0.06% (4)
metasploit framework - 0.06% (4)
that was - 0.06% (4)
was pretty - 0.06% (4)
as usual - 0.06% (4)
2011 release - 0.06% (4)
the swfretools - 0.06% (4)
and then - 0.06% (4)
are in - 0.06% (4)
tool is - 0.06% (4)
the whole - 0.06% (4)
was by - 0.06% (4)
h-1b salary - 0.06% (4)
when i - 0.06% (4)
the audience - 0.06% (4)
now possible - 0.06% (4)
for each - 0.06% (4)
i also - 0.06% (4)
am not - 0.06% (4)
--> saturday, - 0.06% (4)
this is - 0.06% (4)
(0) release - 0.06% (4)
first talk - 0.06% (4)
the day - 0.06% (4)
cheating in - 0.06% (4)
then i - 0.06% (4)
lack of - 0.06% (4)
because i - 0.06% (4)
cisco devices - 0.06% (4)
console output - 0.06% (4)
and how - 0.06% (4)
one of - 0.06% (4)
toad houses - 0.06% (4)
the database - 0.06% (4)
a while - 0.06% (4)
is shown - 0.06% (4)
amount of - 0.06% (4)
expansion pack - 0.06% (4)
san francisco - 0.06% (4)
of binnavi - 0.06% (4)
basic blocks - 0.06% (4)
interested in - 0.06% (4)
the official - 0.06% (4)
are not - 0.04% (3)
up with - 0.04% (3)
feature: when - 0.04% (3)
the gui, - 0.04% (3)
to open - 0.04% (3)
easily distinguished - 0.04% (3)
by actionpush - 0.04% (3)
from pushed - 0.04% (3)
integers. - - 0.04% (3)
last year - 0.04% (3)
emulated cisco - 0.04% (3)
sure that - 0.04% (3)
quite a - 0.04% (3)
focused on - 0.04% (3)
how the - 0.04% (3)
to find - 0.04% (3)
work on - 0.04% (3)
i really - 0.04% (3)
you to - 0.04% (3)
item you - 0.04% (3)
makes it - 0.04% (3)
in fact - 0.04% (3)
i think - 0.04% (3)
in actionscript - 0.04% (3)
15 years - 0.04% (3)
when you - 0.04% (3)
some of - 0.04% (3)
talk to - 0.04% (3)
i don't - 0.04% (3)
years ago - 0.04% (3)
the four - 0.04% (3)
he talked - 0.04% (3)
use the - 0.04% (3)
data mining - 0.04% (3)
(0) cansecwest - 0.04% (3)
the talks - 0.04% (3)
2011 cansecwest - 0.04% (3)
i only - 0.04% (3)
get the - 0.04% (3)
mining h-1b - 0.04% (3)
h-1b visa - 0.04% (3)
related to - 0.04% (3)
i know - 0.04% (3)
feel like - 0.04% (3)
work with - 0.04% (3)
the talk. - 0.04% (3)
day of - 0.04% (3)
and it - 0.04% (3)
at 9:00 - 0.04% (3)
has been - 0.04% (3)
at zynamics - 0.04% (3)
the pwn2own - 0.04% (3)
that we - 0.04% (3)
the cisco - 0.04% (3)
server of - 0.04% (3)
and there - 0.04% (3)
at all - 0.04% (3)
gave a - 0.04% (3)
and other - 0.04% (3)
games like - 0.04% (3)
code, the - 0.04% (3)
can use - 0.04% (3)
able to - 0.04% (3)
to use - 0.04% (3)
the audience. - 0.04% (3)
do not - 0.04% (3)
doing 'dissector.jar - 0.04% (3)
i wrote - 0.04% (3)
book is - 0.04% (3)
but the - 0.04% (3)
like i - 0.04% (3)
take a - 0.04% (3)
own exploit - 0.04% (3)
file formats - 0.04% (3)
look at - 0.04% (3)
target of - 0.04% (3)
a talk - 0.04% (3)
the chapter - 0.04% (3)
in-game currency - 0.04% (3)
what item - 0.04% (3)
conference room - 0.04% (3)
more of - 0.04% (3)
supposed to - 0.04% (3)
parts of - 0.04% (3)
is that - 0.04% (3)
penetration tester's - 0.04% (3)
the console - 0.04% (3)
of chapter - 0.04% (3)
home by - 0.04% (3)
then they - 0.04% (3)
to know - 0.04% (3)
i wanted - 0.04% (3)
expected to - 0.04% (3)
second talk - 0.04% (3)
the beginning - 0.04% (3)
by ?torrent - 0.04% (3)
due to - 0.04% (3)
chapter 15 - 0.04% (3)
sent home - 0.04% (3)
does it - 0.04% (3)
the reader - 0.04% (3)
to understand - 0.04% (3)
chapter 14 - 0.04% (3)
they did - 0.04% (3)
super mario - 0.04% (3)
used to - 0.04% (3)
the end, - 0.04% (3)
see what - 0.04% (3)
the penetration - 0.04% (3)
feature: it - 0.04% (3)
writing file - 0.04% (3)
you have - 0.04% (3)
feed rss - 0.04% (3)
possible to - 0.04% (3)
tester's guide - 0.04% (3)
who do - 0.04% (3)
as one - 0.04% (3)
give his - 0.04% (3)
and to - 0.04% (3)
of metasploit - 0.04% (3)
metasploit - - 0.04% (3)
to give - 0.04% (3)
last talk - 0.04% (3)
to improve - 0.04% (3)
if the - 0.04% (3)
in this - 0.03% (2)
executed and - 0.03% (2)
on stage. - 0.03% (2)
not comment - 0.03% (2)
about bluetooth - 0.03% (2)
1.0 feed - 0.03% (2)
he was - 0.03% (2)
all basic - 0.03% (2)
rss 2.0 - 0.03% (2)
is the - 0.03% (2)
which are - 0.03% (2)
that were - 0.03% (2)
he did - 0.03% (2)
talk. i - 0.03% (2)
the iphone - 0.03% (2)
comment (1) - 0.03% (2)
on security - 0.03% (2)
function i - 0.03% (2)
hotel room - 0.03% (2)
literally no - 0.03% (2)
feed atom - 0.03% (2)
might have - 0.03% (2)
the time - 0.03% (2)
time for - 0.03% (2)
did the - 0.03% (2)
the contest. - 0.03% (2)
only be - 0.03% (2)
that can - 0.03% (2)
and daniele - 0.03% (2)
used in - 0.03% (2)
of their - 0.03% (2)
he has - 0.03% (2)
blocks were - 0.03% (2)
were hit - 0.03% (2)
talk of - 0.03% (2)
a quick - 0.03% (2)
the basic - 0.03% (2)
was very - 0.03% (2)
and less - 0.03% (2)
ever seen - 0.03% (2)
network devices - 0.03% (2)
investment in - 0.03% (2)
his own - 0.03% (2)
observations of - 0.03% (2)
as part - 0.03% (2)
the best - 0.03% (2)
be seen - 0.03% (2)
going on. - 0.03% (2)
shows a - 0.03% (2)
to java. - 0.03% (2)
2. 2011 - 0.03% (2)
to everyone - 0.03% (2)
mario bros - 0.03% (2)
open source - 0.03% (2)
for use - 0.03% (2)
the item - 0.03% (2)
does the - 0.03% (2)
game decide - 0.03% (2)
component for - 0.03% (2)
in san - 0.03% (2)
wrote a - 0.03% (2)
bros 3 - 0.03% (2)
jhexview 1.0 - 0.03% (2)
1.0 posted - 0.03% (2)
know what - 0.03% (2)
of jhexview - 0.03% (2)
--> friday, - 0.03% (2)
you enter - 0.03% (2)
(2) trackbacks - 0.03% (2)
see some - 0.03% (2)
year but - 0.03% (2)
engineering tools: - 0.03% (2)
is sending - 0.03% (2)
last friday - 0.03% (2)
(0) data - 0.03% (2)
someone who - 0.03% (2)
the right - 0.03% (2)
with me - 0.03% (2)
insights from - 0.03% (2)
a cool - 0.03% (2)
for reverse - 0.03% (2)
tools: insights - 0.03% (2)
and feel - 0.03% (2)
some that - 0.03% (2)
and others - 0.03% (2)
to talk - 0.03% (2)
context of - 0.03% (2)
year i - 0.03% (2)
it too - 0.03% (2)
who does - 0.03% (2)
from someone - 0.03% (2)
first day - 0.03% (2)
about this - 0.03% (2)
and when - 0.03% (2)
free breakfast - 0.03% (2)
a pretty - 0.03% (2)
cisco 2600 - 0.03% (2)
application level - 0.03% (2)
the emulated - 0.03% (2)
debugging the - 0.03% (2)
which i - 0.03% (2)
i used - 0.03% (2)
first screenshot - 0.03% (2)
last few - 0.03% (2)
figure out - 0.03% (2)
was on - 0.03% (2)
started off - 0.03% (2)
can see - 0.03% (2)
server for - 0.03% (2)
the debugger - 0.03% (2)
screenshot shows - 0.03% (2)
wall centre - 0.03% (2)
the sheraton - 0.03% (2)
shockwave file - 0.03% (2)
tools available - 0.03% (2)
the toad - 0.03% (2)
through the - 0.03% (2)
enter the - 0.03% (2)
i remember - 0.03% (2)
up there - 0.03% (2)
what you - 0.03% (2)
quirky swag - 0.03% (2)
whole day. - 0.03% (2)
of all - 0.03% (2)
random observations - 0.03% (2)
side of - 0.03% (2)
them to - 0.03% (2)
toad house? - 0.03% (2)
june 20. - 0.03% (2)
have never - 0.03% (2)
work at - 0.03% (2)
gdb agent - 0.03% (2)
news is - 0.03% (2)
is already - 0.03% (2)
have made - 0.03% (2)
of cisco - 0.03% (2)
chip & - 0.03% (2)
data is - 0.03% (2)
food quality - 0.03% (2)
console listing - 0.03% (2)
reader is - 0.03% (2)
skill level - 0.03% (2)
of having - 0.03% (2)
the result - 0.03% (2)
i noticed - 0.03% (2)
of your - 0.03% (2)
are at - 0.03% (2)
in-depth background - 0.03% (2)
for any - 0.03% (2)
is little - 0.03% (2)
of console - 0.03% (2)
the funniest - 0.03% (2)
it also - 0.03% (2)
of each - 0.03% (2)
one-third of - 0.03% (2)
pages), 'meterpreter - 0.03% (2)
(8 pages), - 0.03% (2)
pages), 'the - 0.03% (2)
pages), 'metasploit - 0.03% (2)
individual chapters - 0.03% (2)
recently i - 0.03% (2)
book reviews - 0.03% (2)
starting with - 0.03% (2)
the book, - 0.03% (2)
long time - 0.03% (2)
are really - 0.03% (2)
tools collection - 0.03% (2)
my swf - 0.03% (2)
1.2.0 of - 0.03% (2)
since i - 0.03% (2)
two weeks - 0.03% (2)
swfretools 1.3.0 - 0.03% (2)
output listings - 0.03% (2)
down on - 0.03% (2)
in general, - 0.03% (2)
order of - 0.03% (2)
both are - 0.03% (2)
nearly as - 0.03% (2)
have to - 0.03% (2)
to metasploit. - 0.03% (2)
get to - 0.03% (2)
those two - 0.03% (2)
let's take - 0.03% (2)
creating your - 0.03% (2)
the chapters - 0.03% (2)
good news - 0.03% (2)
have been - 0.03% (2)
to read - 0.03% (2)
book review: - 0.03% (2)
been a - 0.03% (2)
things like - 0.03% (2)
later i - 0.03% (2)
had already - 0.03% (2)
am wondering - 0.03% (2)
of cheat - 0.03% (2)
am sure - 0.03% (2)
not be - 0.03% (2)
they could - 0.03% (2)
save games - 0.03% (2)
modify the - 0.03% (2)
they go - 0.03% (2)
where you - 0.03% (2)
this was - 0.03% (2)
player games - 0.03% (2)
to extend - 0.03% (2)
allowed you - 0.03% (2)
it allowed - 0.03% (2)
this blog - 0.03% (2)
lot of - 0.03% (2)
to unlock - 0.03% (2)
need about - 0.03% (2)
health points. - 0.03% (2)
knight is - 0.03% (2)
comments (2) - 0.03% (2)
that only - 0.03% (2)
like muffin - 0.03% (2)
easy to - 0.03% (2)
to add - 0.03% (2)
disturbing lack - 0.03% (2)
have also - 0.03% (2)
other people - 0.03% (2)
i will - 0.03% (2)
an old - 0.03% (2)
would have - 0.03% (2)
view i - 0.03% (2)
and more - 0.03% (2)
think of - 0.03% (2)
the game. - 0.03% (2)
in-game content - 0.03% (2)
are freemium - 0.03% (2)
freemium content - 0.03% (2)
wondering what - 0.03% (2)
a single - 0.03% (2)
games of - 0.03% (2)
if anybody - 0.03% (2)
they are - 0.03% (2)
into the - 0.03% (2)
tap fish - 0.03% (2)
getting everything - 0.03% (2)
are very - 0.03% (2)
paradise island - 0.03% (2)
this new - 0.03% (2)
dump the - 0.03% (2)
i went - 0.03% (2)
no surprise - 0.03% (2)
fortunately it - 0.03% (2)
shortly after - 0.03% (2)
and his - 0.03% (2)
pointer analysis - 0.03% (2)
sorts of - 0.03% (2)
issues that - 0.03% (2)
in coldfusion - 0.03% (2)
and what - 0.03% (2)
the usual - 0.03% (2)
about an - 0.03% (2)
we started - 0.03% (2)
an adobe - 0.03% (2)
once again - 0.03% (2)
and last - 0.03% (2)
reading "data - 0.03% (2)
given per - 0.03% (2)
have it - 0.03% (2)
and not - 0.03% (2)
salary field - 0.03% (2)
the maximum - 0.03% (2)
originally i - 0.03% (2)
h-1b visas - 0.03% (2)
turned out - 0.03% (2)
for example - 0.03% (2)
that had - 0.03% (2)
people are - 0.03% (2)
an hour - 0.03% (2)
game consoles - 0.03% (2)
devices to - 0.03% (2)
they also - 0.03% (2)
sheraton wall - 0.03% (2)
made it - 0.03% (2)
many people - 0.03% (2)
9:00 am - 0.03% (2)
friday, march - 0.03% (2)
see more - 0.03% (2)
most of - 0.03% (2)
about fuzzing - 0.03% (2)
this year - 0.03% (2)
the line-up - 0.03% (2)
of cansecwest. - 0.03% (2)
talks today - 0.03% (2)
any more - 0.03% (2)
available to - 0.03% (2)
after the - 0.03% (2)
very good - 0.03% (2)
to draw - 0.03% (2)
tried to - 0.03% (2)
they set - 0.03% (2)
at least - 0.03% (2)
the database. - 0.03% (2)
file>'. feature: - 0.03% (2)
the adjusted - 0.03% (2)
bugfix: in - 0.03% (2)
2 constantpool - 0.03% (2)
is going. - 0.03% (2)
a jump - 0.03% (2)
out where - 0.03% (2)
the user - 0.03% (2)
easier for - 0.03% (2)
address. this - 0.03% (2)
raw relative - 0.03% (2)
address instead - 0.03% (2)
the jump - 0.03% (2)
2 actions - 0.03% (2)
2 code, - 0.03% (2)
swfretools 1.2.0 - 0.03% (2)
github. i - 0.03% (2)
download the - 0.03% (2)
swf files. - 0.03% (2)
can now - 0.03% (2)
gui to - 0.03% (2)
command line - 0.03% (2)
- 0.03% (2)
by doing - 0.03% (2)
previous versions, - 0.03% (2)
belonging to - 0.03% (2)
time to - 0.03% (2)
view showing - 0.03% (2)
i posted - 0.03% (2)
field i - 0.03% (2)
single-player freemium - 0.03% (2)
salary information - 0.03% (2)
probably the - 0.03% (2)
the salary - 0.03% (2)
a very - 0.03% (2)
can get - 0.03% (2)
code in - 0.03% (2)
actionscript 3 - 0.03% (2)
all parts - 0.03% (2)
tag were - 0.03% (2)
and now - 0.03% (2)
flash player - 0.03% (2)
a java-based - 0.03% (2)
the binary - 0.03% (2)
on github - 0.03% (2)
vulnerability researchers - 0.03% (2)
swfretools 1.1.0 - 0.03% (2)
--> monday, - 0.03% (2)
defined by - 0.03% (2)
fixed. - - 0.03% (2)
tree. this - 0.03% (2)
powered by - 0.03% (2)
shown in the - 0.23% (16)
posted by sp - 0.21% (15)
in the gui - 0.21% (15)
sp in misc - 0.16% (11)
in misc at - 0.16% (11)
not shown in - 0.14% (10)
bugfix: actionscript 2 - 0.11% (8)
- bugfix: actionscript - 0.11% (8)
were previously not - 0.11% (8)
in the gui. - 0.11% (8)
instructions were previously - 0.11% (8)
previously not shown - 0.11% (8)
(0) trackbacks (0) - 0.1% (7)
gui. - bugfix: - 0.1% (7)
comments (0) trackbacks - 0.1% (7)
the gui. - - 0.1% (7)
cansecwest 2011 - - 0.09% (6)
2011 - day - 0.09% (6)
actionscript 2 code - 0.09% (6)
reverse engineering tools - 0.07% (5)
a swf file - 0.07% (5)
the content of - 0.07% (5)
file format parsers - 0.07% (5)
format parsers for - 0.07% (5)
they talked about - 0.06% (4)
the metasploit framework - 0.06% (4)
it is now - 0.06% (4)
(0) release of - 0.06% (4)
2011 release of - 0.06% (4)
the first talk - 0.06% (4)
in the database - 0.06% (4)
h-1b salary data - 0.06% (4)
of the book - 0.06% (4)
trackbacks (0) release - 0.06% (4)
wanted to know - 0.04% (3)
- feature: when - 0.04% (3)
from pushed integers. - 0.04% (3)
now easily distinguished - 0.04% (3)
gdb server of - 0.04% (3)
by actionpush are - 0.04% (3)
one of the - 0.04% (3)
pushed by actionpush - 0.04% (3)
2 code is - 0.04% (3)
feature: when actionscript - 0.04% (3)
pushed integers. - - 0.04% (3)
easily distinguished from - 0.04% (3)
actionpush are now - 0.04% (3)
in the gui, - 0.04% (3)
is shown in - 0.04% (3)
what item you - 0.04% (3)
are now easily - 0.04% (3)
when actionscript 2 - 0.04% (3)
toad houses disassembled - 0.04% (3)
2011 cansecwest 2011 - 0.04% (3)
distinguished from pushed - 0.04% (3)
the actionscript 2 - 0.04% (3)
second talk was - 0.04% (3)
i wanted to - 0.04% (3)
data sent home - 0.04% (3)
sent home by - 0.04% (3)
data mining h-1b - 0.04% (3)
trackbacks (0) cansecwest - 0.04% (3)
of the day - 0.04% (3)
to the conference - 0.04% (3)
code is shown - 0.04% (3)
to see what - 0.04% (3)
here is an - 0.04% (3)
the book is - 0.04% (3)
and how to - 0.04% (3)
... posted by - 0.04% (3)
metasploit - the - 0.04% (3)
as one of - 0.04% (3)
penetration tester's guide - 0.04% (3)
i have not - 0.04% (3)
instead of the - 0.04% (3)
this makes it - 0.04% (3)
years ago i - 0.04% (3)
release of jhexview - 0.03% (2)
last year but - 0.03% (2)
in the audience. - 0.03% (2)
1.0 posted by - 0.03% (2)
if you are - 0.03% (2)
to see more - 0.03% (2)
and then the - 0.03% (2)
is a pretty - 0.03% (2)
comment (1) trackbacks - 0.03% (2)
not comment on - 0.03% (2)
not have a - 0.03% (2)
jump is going. - 0.03% (2)
he talked about - 0.03% (2)
there are freemium - 0.03% (2)
as part of - 0.03% (2)
and the iphone - 0.03% (2)
in a while - 0.03% (2)
to give his - 0.03% (2)
can not comment - 0.03% (2)
on the content - 0.03% (2)
the last talk - 0.03% (2)
to get the - 0.03% (2)
freemium games like - 0.03% (2)
a talk about - 0.03% (2)
random observations of - 0.03% (2)
to the pwn2own - 0.03% (2)
feel like i - 0.03% (2)
a hotel room - 0.03% (2)
wondering what the - 0.03% (2)
the sheraton wall - 0.03% (2)
insights from someone - 0.03% (2)
could not be - 0.03% (2)
of the cisco - 0.03% (2)
enter the toad - 0.03% (2)
debugging emulated cisco - 0.03% (2)
had to be - 0.03% (2)
all parts of - 0.03% (2)
use the gdb - 0.03% (2)
server of cisco - 0.03% (2)
single-player freemium games - 0.03% (2)
an in-game currency - 0.03% (2)
to the gdb - 0.03% (2)
gdb server for - 0.03% (2)
screenshot shows a - 0.03% (2)
seen in the - 0.03% (2)
basic blocks were - 0.03% (2)
all basic blocks - 0.03% (2)
the toad house? - 0.03% (2)
super mario bros - 0.03% (2)
reverse engineering tools: - 0.03% (2)
they could not - 0.03% (2)
it was time - 0.03% (2)
who does it - 0.03% (2)
the context of - 0.03% (2)
for reverse engineering - 0.03% (2)
tools: insights from - 0.03% (2)
someone who does - 0.03% (2)
to figure out - 0.03% (2)
stars to unlock - 0.03% (2)
it turned out - 0.03% (2)
can be seen - 0.03% (2)
and feel like - 0.03% (2)
want to talk - 0.03% (2)
to talk about - 0.03% (2)
mario bros 3 - 0.03% (2)
the game decide - 0.03% (2)
he was not - 0.03% (2)
enjoyed the talk - 0.03% (2)
the next talk - 0.03% (2)
were not shown - 0.03% (2)
parts of the - 0.03% (2)
console output listings - 0.03% (2)
to improve the - 0.03% (2)
been fixed. - - 0.03% (2)
tree. this has - 0.03% (2)
the flash dissector - 0.03% (2)
of my swf - 0.03% (2)
belonging to a - 0.03% (2)
actionscript 2 actions - 0.03% (2)
previous versions, the - 0.03% (2)
- bugfix: in - 0.03% (2)
has been fixed. - 0.03% (2)
dissector tree. this - 0.03% (2)
in the flash - 0.03% (2)
actions belonging to - 0.03% (2)
of the chapter - 0.03% (2)
actionscript 2 code, - 0.03% (2)
user to find - 0.03% (2)
easier for the - 0.03% (2)
raw relative address. - 0.03% (2)
the adjusted address - 0.03% (2)
gui is now - 0.03% (2)
the jump target - 0.03% (2)
- feature: in - 0.03% (2)
dump the content - 0.03% (2)
engineering tools collection - 0.03% (2)
my swf reverse - 0.03% (2)
version 1.2.0 of - 0.03% (2)
you can download - 0.03% (2)
of swf files - 0.03% (2)
in previous versions, - 0.03% (2)
15 - after - 0.03% (2)
you can use - 0.03% (2)
what the actionscript - 0.03% (2)
talk about fuzzing - 0.03% (2)
about an adobe - 0.03% (2)
the usual suspects - 0.03% (2)
supposed to be - 0.03% (2)
fortunately it turned - 0.03% (2)
talk about an - 0.03% (2)
available to everyone - 0.03% (2)
you can get - 0.03% (2)
day of cansecwest - 0.03% (2)
think of the - 0.03% (2)
they are really - 0.03% (2)
sheraton wall centre - 0.03% (2)
out where a - 0.03% (2)
that was the - 0.03% (2)
i did not - 0.03% (2)
at 9:00 am - 0.03% (2)
- the penetration - 0.03% (2)
the authors explain - 0.03% (2)
of the swf - 0.03% (2)
in chapter 15 - 0.03% (2)
of swfretools 1.1.0 - 0.03% (2)
comments (2) trackbacks - 0.03% (2)
beginning of chapter - 0.03% (2)
the binary content - 0.03% (2)
is a java-based - 0.03% (2)
the reader is - 0.03% (2)
to the metasploit - 0.03% (2)
analysis with the - 0.03% (2)
in the database. - 0.03% (2)
originally i wanted - 0.03% (2)
to work with - 0.03% (2)
the maximum salary - 0.03% (2)
maximum salary field - 0.03% (2)
cheating in single-player - 0.03% (2)

Here you can find chart of all your popular one, two and three word phrases. Google and others search engines means your page is about words you use frequently.

Copyright © 2015-2016 hupso.pl. All rights reserved. FB | +G | Twitter

Hupso.pl jest serwisem internetowym, w którym jednym kliknieciem możesz szybko i łatwo sprawdź stronę www pod kątem SEO. Oferujemy darmowe pozycjonowanie stron internetowych oraz wycena domen i stron internetowych. Prowadzimy ranking polskich stron internetowych oraz ranking stron alexa.