<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>Using NtCreateThreadEx for Remote Thread Execution in System Process for Vista &amp;amp; Windows7</title>
                            <pubDate>Fri, 24 Dec 2010 02:16:57 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1635/Using_NtCreateThreadEx_for_Remote_Thread_Execution_in_System_Process_for_Vista_&amp;_Windows7</link>
                                        <author>tnagareshwar &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Some times back I wrote article on using lesser known method, &lt;b&gt;NTCreateThreadEx&lt;/b&gt; for remote thread execution. This is better alternative compared to &lt;b&gt;CreateRemoteThread&lt;/b&gt; especially for Vista &amp;amp; Windows 7. As you may aware CreateRemoteThread was the popular method used for DLL Injection.&lt;br /&gt;
&lt;br /&gt;
Here are some of the highlights of this technique&lt;br /&gt;
&lt;br /&gt;
* Major advantage is that it can work across session boundaries while CreateRemoteThread cannot.&lt;br /&gt;
&lt;br /&gt;
* User need to have sufficient privileges to perform tasks such as DLL injection using this method.&lt;br /&gt;
&lt;br /&gt;
* It is &lt;b&gt;UNDOCUMENTED&lt;/b&gt;-&amp;nbsp;&amp;nbsp;there is a risk but it is worth it.&lt;br /&gt;
&lt;br /&gt;
This article explains everything you need to know about NtCreateThreadEx with complete &lt;b&gt;code example&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
Click on the below link to read the full article,&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://securityxploded.com/ntcreatethreadex.php&quot;&gt;Remote Thread Execution in System Process using NtCreateThreadEx for Vista &amp;amp; Windows7 &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
.&lt;br /&gt;
&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Reversing PDF - Vulnerabilities, Exploits and Malwares</title>
                            <pubDate>Wed, 24 Nov 2010 11:57:46 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1628/Reversing_PDF_-_Vulnerabilities,_Exploits_and_Malwares</link>
                                        <author>tnagareshwar &lt;email-suppressed@example.com&gt;</author>
                                                    <description>In this tutorial, Dhanesh explains how to use basic PDF analysis tools such as &lt;b&gt;PDFAnalyzer&lt;/b&gt; in dissecting the exploit code from malicious PDF files in simple steps with illustrative screenshots. &lt;br /&gt;
&lt;br /&gt;
Highlights of the Article&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;* Throws light on usage of PDF analysis tools such as PDFAnalyzer&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;* Demonstrates malware analysis of real PDF samples&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;* Describes in detail dissecting of the exploit code from PDF structures.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Read the &lt;a href=&quot;http://securityxploded.com/pdf_vuln_exploits.php&quot;&gt;&lt;b&gt;complete article here&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>Android Reverse Engineering - A Kick Start</title>
                            <pubDate>Sun, 14 Nov 2010 01:19:27 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1625/Android_Reverse_Engineering_-_A_Kick_Start</link>
                                        <author>tnagareshwar &lt;email-suppressed@example.com&gt;</author>
                                                    <description>In this article our contributing author Dhanesh &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;* explains about basics of Andriod Reverse Engineering with step by step tutorial using simple crackme. &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;* throws light on the tools required for reversing and demonstrate how to use them in right sequence with complete pictorial representation.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;* describes dissecting of the Android code package to reveal the secrets. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://securityxploded.com/android_reversing.php&quot;&gt;Read More&lt;/a&gt;&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>VistaUACMaker with New Look &amp; Feel</title>
                            <pubDate>Fri, 29 May 2009 20:00:23 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/1467/VistaUACMaker_with_New_Look_&_Feel</link>
                                        <author>tnagareshwar &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Vista has introduced new feature&amp;nbsp;&amp;nbsp;			called UAC (User Account Control). In short it basically controls&amp;nbsp;&amp;nbsp;			the way in which applications are executed by different users. Due&amp;nbsp;&amp;nbsp;			to enforcement of this UAC, by default any application on Vista will&amp;nbsp;&amp;nbsp;			run under the context of standard user instead of administrator. As&amp;nbsp;&amp;nbsp;			a [...]</description>
                    </item>
                <item>
            <title>SpyDLLRemover with Spyware Scanning Feature</title>
                            <pubDate>Fri, 29 May 2009 19:51:16 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/1468/SpyDLLRemover_with_Spyware_Scanning_Feature</link>
                                        <author>tnagareshwar &lt;email-suppressed@example.com&gt;</author>
                                                    <description>SpyDLLRemover is the standalone tool to&amp;nbsp;&amp;nbsp;		effectively detect and delete spywares from the system. Now It comes with&amp;nbsp;&amp;nbsp;		advanced spyware scanner which can quickly discovers hidden Rootkit&amp;nbsp;&amp;nbsp;		processes as well suspicious/injected DLLs within all running processes.&amp;nbsp;&amp;nbsp;		It not only performs sophisticated auto analysis on process DLLs but&amp;nbsp;&amp;nbsp;		also displays them [...]</description>
                    </item>
            </channel>
</rss>
