<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>SandMan 1.0.080226 is out!</title>
                            <pubDate>Tue, 26 Feb 2008 13:41:32 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1070/SandMan_1.0.080226_is_out!</link>
                                        <author>msuiche &lt;email-suppressed@example.com&gt;</author>
                                                    <description>What is SandMan?&lt;br /&gt;
&lt;br /&gt;
SandMan is a (live) forensic &amp;amp; offensic framework providing a C library and a python portage to make readable and writable the hibernation file.&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://www.msuiche.net/wp-content/uploads/2008/02/sandman_sample1.png&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
SandMan is open-source and now available at the following link:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://sandman.msuiche.net.&quot;&gt;http://sandman.msuiche.net.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sample of code using SandMan (python)&lt;br /&gt;
&lt;code&gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
#&lt;br /&gt;
#&lt;br /&gt;
#Module Name:&lt;br /&gt;
# &lt;br /&gt;
#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;sample1.py&lt;br /&gt;
# &lt;br /&gt;
#Abstract:&lt;br /&gt;
# &lt;br /&gt;
#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Display target version.&lt;br /&gt;
#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Build a physical memory dump from a hibernation file.&lt;br /&gt;
# &lt;br /&gt;
#Environment:&lt;br /&gt;
# &lt;br /&gt;
#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Python&lt;br /&gt;
# &lt;br /&gt;
#Revision History:&lt;br /&gt;
# &lt;br /&gt;
#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Matthieu Suiche&lt;br /&gt;
# &lt;br /&gt;
&lt;br /&gt;
import sys&lt;br /&gt;
import sandman&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) != 3:&lt;br /&gt;
	print &amp;quot;Matthieu Suiche - http://sandman.msuiche.net/&amp;quot;&lt;br /&gt;
	print &amp;quot;Usage: sample.py hiberfil.sys physical_dump.vmem&amp;quot;&lt;br /&gt;
	sys.exit(1)&lt;br /&gt;
&lt;br /&gt;
s = sandman.hiber_open(sys.argv[1])&lt;br /&gt;
&lt;br /&gt;
ver = sandman.hiber_get_version(s);&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Windows version %d.%d.%d\n&amp;quot; % (ver &amp;amp; 0xFF, (ver &amp;amp; 0xFF00) &amp;gt;&amp;gt; 8, ver &amp;gt;&amp;gt; 16)&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Generate physical memory dump...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
sandman.hiber_dump(s, sys.argv[2])&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Done.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
sandman.hiber_close(s)&lt;br /&gt;
&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
Cheers,&lt;br /&gt;
&lt;br /&gt;
(Original blog post: &lt;br /&gt;
&lt;a href=&quot;http://www.msuiche.net/2008/02/26/sandman-10080226-is-out/&quot;&gt;http://www.msuiche.net/2008/02/26/sandman-10080226-is-out/&lt;/a&gt;)</description>
                    </item>
                <item>
            <title>Windows Vista and unexported kernel symbols (Part II, 32bits version)</title>
                            <pubDate>Wed, 31 Jan 2007 21:31:22 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/592/Windows_Vista_and_unexported_kernel_symbols_(Part_II,_32bits_version)</link>
                                        <author>msuiche &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;p&gt;This paper exposes part II of my previous article about Windows Vista and internals structures. This one is talking about the 32bits version and aims to show new authencity tricks.&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;Download it from the following link:&lt;br /&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.msuiche.net/papers/Windows_Vista_32bits_and_unexported_kernel_symbols.pdf&quot;&gt; Windows_Vista_32bits_and_unexported_kernel_symbols.pdf&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;Cheers,&lt;/p&gt;</description>
                    </item>
                <item>
            <title>Windows Vista 64-bits and unexported kernel symbols.</title>
                            <pubDate>Mon, 01 Jan 2007 00:00:00 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/563/Windows_Vista_64-bits_and_unexported_kernel_symbols.</link>
                                        <author>msuiche &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;p&gt;Hi,&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;I&amp;#8217;m gonna published my (the?) first paper of the year 2007 !! :)&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;This article is talking about Windows Vista 64bits and its system structures which are proteged against rootkit. I also explain how these structures can be authentified without Pathguard.&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;&lt;a href=&quot;http://www.msuiche.net/papers/Windows_Vista_64bits_and_unexported_kernel_symbols.pdf&quot;&gt;Windows Vista 64bits and unexported kernel symbols.pdf&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;Happy New Year !!!&lt;/p&gt;</description>
                    </item>
                <item>
            <title>Translation “Patchguard alternative theory” presentation.</title>
                            <pubDate>Sun, 24 Dec 2006 13:10:56 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/546/Translation_“Patchguard_alternative_theory”_presentation.</link>
                                        <author>msuiche &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;a href=&quot;http://www.msuiche.net/2006/12/24/translation-of-my-patchguard-alternative-theory-presentation/&quot;&gt;http://www.msuiche.net/2006/12/24/translation-of-my-patchguard-alternative-theory-presentation/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
I did a translation into English of my previous presentation which explain how to realize a protector for IDT, SSDT, and syscall address on Windows 32 and 64bits. This could be see as a kind of alternative to Patchguard.&lt;br /&gt;
&lt;br /&gt;
The translation can be found at the following link : &lt;a href=&quot;http://www.msuiche.net/pres/Windows%20Vista%20Kernel%20Security%20-%20[EN].ppt&quot;&gt;http://www.msuiche.net/pres/Windows%20Vista%20Kernel%20Security%20-%20[EN].ppt&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
I’m writting an article about it which will be released very soon.&lt;br /&gt;
&lt;br /&gt;
Happy merry xmas !</description>
                    </item>
                <item>
            <title>First commit @ TinyKrnl !</title>
                            <pubDate>Fri, 15 Dec 2006 20:35:07 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/555/First_commit_@_TinyKrnl_!</link>
                                        <author>msuiche &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;p&gt;Hi there!&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;I&amp;#8217;m proud to announce I did my first commit for tinykrnl !&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;&lt;a href=&quot;http://svn.reactos.ru/svn/tinykrnl?view=rev&amp;#038;revision=729&quot;&gt;http://svn.reactos.ru/svn/tinykrnl?view=rev&amp;#038;revision=729&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;
&lt;p&gt;Cheers,&lt;/p&gt;</description>
                    </item>
            </channel>
</rss>
