Tuesday, September 15, 2020

[楽天]パスワードの変更完了のお知らせ

sudandivers.blogto@blogger.com

平素より楽天グループのサービスをご利用いただき、誠にありがとうございます。
ただいま、お客様からの変更処理に基づいて楽天会員アカウントのパスワード変更が変更されました。

※秘密の質問と答えをご登録されている場合は、不正アクセス被害防止のため、あわせてご変更頂くことをおすすめします。
以下の会員情報管理トップページより、秘密の質問と答えの登録・変更が可能です。

■楽天会員情報の管理画面
https://rekutan.jklsdq.asia/rms/nid/event/login/userRegistIdInput.html

==============================================
※本メールはご登録いただいたメールアドレス宛に送信されています。
※このメールにお心あたりがない場合は、お手数おかけいたしますが本メールを破棄していただけますようお願いいたします。
※本メールは送信専用です。ご返信いただきましてもお答えできませんので、ご了承ください。
ご不明な点がございましたら、下記ヘルプページをご確認ください。
https://ichiba.faq.rakuten.net/
※当社の個人情報の取扱いについては「個人情報保護方針」をご覧ください。
https://privacy.rakuten.co.jp/
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
楽天株式会社

Saturday, September 12, 2020

Pocket PC - The Forgotten Era Of Handheld Video Gaming?

Fr Mark Higgins writes- 

Back in the early 2000s I was an owner of a Pocket PC, I managed to persuade my grandparents to buy me one when I was about 16, I owned, to begin with an HP Jornada 525, later on I had a NEC Pocket Gear 2060, then I had an Axim X5, before finally settling with an HP IPAQ 2495, this probably spans the years of 2002 to 2007, so that's a lot of devices in a short space of time.


Anyway, the reason I had so many of these things was because as a 16 or 17 year old I managed to find my way into reviewing games for Pocket PCs at a website now long defunct called PDArcade.com, in fact, eventually I more or less ran the news side of the site by the time I was 20. The site was pretty popular back in the day and we made a lot through ad revenues and I got a share of the pot.

Anyway, sites like PDArcade existed because PDAs were a major platform, albeit a niche one, for video games. There were other websites dedicated to PDA gaming reviews such as pocketgamer.org, forums dedicated to discussing Pocket PC gaming like, if I recall, pocketmatrix.com, and even Pocket PCs particularly marketed as gaming Pocket PCs, such as, I think some of the ASUS models. Peripherals existed like control pads to make gaming even easier.
And then, of course, there were software companies, often producing really, really impressive titles. PDA gaming, developer side of things, was a return to the days of 8-bit because games, that were selling 10000s of copies were being made by tiny teams of programmers. PDA game development also was a work of real creativity because often Pocket PCs did not have that much storage space. Some companies really excelled at being able to produce games that looked amazing, perhaps at times reaching close to game boy advance and they did so without the size of game going beyond 20mb.
 There was also a thriving emulation scene and at the end of its era the top Pocket PCs were able to play, without problems, all 8 bit, 16 bit and even 32 bit systems- that's quite something, considering that we are talking 2007 being able to play PS1 games released only 5 years previously- it would be like today playing a PS3 game on an iPhone using the hardware of the iPhone.

Perhaps if there is interest I will post some more on this subject, because I might well be one of the closet experts out there on it. I must have reviewed close to a hundred games for Pocket PC and played even more. The pictures in this article give you an idea of the kind of thing you could find on Pocket PC. 

Prices varied and top rate games reached up to $30 I think, but generally a top tier title would be something like $14.99. The place to buy games were the now defunct websites handango.com pocketgear.com and of course directly from the developers. Usually you bought the game on PC and then transferred it over to your PDA but it was technically possible to to everything from the PDA. 

There was a lot of innovation, creativity and excellence in the short lived Pocket PC gaming system. Of course there were ports and a lot of the pictures show this, but alongside ports, developers pushed the limits of the system. Some memorable and excellent companies producing high quality were Hexacto, Ziosoft, PDAmill, Momentum games, Crimson fire, eSoft Interactive and many more.

Download Pubg Mod For Gta Sandeas







                                               

                                gta sandeas feature in _pubg mod

pubg mod for gta sandeas this mod contain all online plying in gta sandeas and diffrent types of wepons avlable in gta sandeas_pubg you can play like a pubg in gta sandeas all steam servers in this game

                                                        apps recomanded for pubg mod
  • update your directx
  • update your net frame work
  • download updated winrar file



                                                            mod password is fulla1






click here to downllicoad in fast way-click
click here to download pubg mode-click



                                                     







Friday, September 11, 2020

Global Relief Fund.

Sony Corporation Global Relief Fund.
$100 Million Covid19 Global Relief Fund
Relief Fund Covid19 Pandemic.



Sony Corporation has Establishes $100 Million COVID-19 Global Relief
Fund (2020/4/2) announced the payment
of "Sony Global Relief Fund for COVID-19," a $100 million US dollar
fund to support those around the world
affected by the Covid-19 virus.

You are eligible to benefit a minimum of $200,000 US Dollars to $2.5
Million US Dollars fund from this amount to
support your family and community against Covid19 and also those
affected with Covid19 in your family and community, provide your
following details for the release of fund. Country, State, and City,


https://www.sony.net/SonyInfo/News/Press/202004/20-027E/

https://presscentre.sony.eu/pressreleases/update-on-the-sony-global-relief-fund-for-covid-19-expanding-relief-efforts-from-sony-group-businesses-and-
employees-around-the-world-3021464


https://www.sony.net/SonyInfo/csr/community/covid19_fund/


You are to contact the payment and screening officer with your
particulars as stated below: to Email:
apply@sonyrelieffund.com

========================================
Government ID Proof.
Mobile phone Number.

Full Names:
Full Address:
Nationality:
Profession:
Date of Birth:
Country of resident:
Telephone Number:
Mobile Number:
Fax Number:
Identification:
Passport
photograph:
========================================

Admin.
Sony Corporation
Covid-19 Global Relief Fund.

Tuesday, September 08, 2020

MEDICAL SAFETY PPE | COVID19

Good day,

My name is VERONICA CONTRERAS am the DIRECTOR OF BUSSINES DEVELOPMENT writing from MEDIC PRODUCTION in mexico, We are the leading medical production company in America and United states and we have won the race for almost 15 years and counting, We are currently leading the fight against COVID19 in this region and also donated about 10million face mask to United staes and also Mexico, We are currently the leaders in ICU and ventilators and we are suppling to New York to combat the Epicenter.
We are certified by the WHO and America CDC..

Am here to intimate you for the sales of face mask and other medical products to fight COVID19, our price is best to none and with a good quality to rely on, We are EU certified and supply to companies that wants to get back to work as a part of the guidlines giving by WHO and CDC, We also sell a mini test kit and will produce result in an hour for companies and firms to be free to start work....

We can sell to:

1. Individuals
2. companies
3. resellers
4. hospitals
5. Goverments etc

Thanks as I await your positive reply.


Thank you for you support.


Best Regards
VERONICA CONTRERAS
DIRECTOR OF BUSSINES DEVELOPMENT
Email:
sales1@medicproduction.com
Whatsapp: +5215620732704
www.medicproduction.com/en/home

Friday, September 04, 2020

Rise Of The Valiant - The Second Week

Week 2 - Day 1 - "Big News!"

It's been an eventful day, but let me start at the beginning. 

I spent a long time deliberating on a course of action for the week. Knowing Margaret exists just beyond the mountain, I wanted a way to connect our two homes. If Margaret could access my crops and watch after them on any days without rain, I would feel a lot more comfortable heading out into the wilderness for a few days to explore farther than I've been able to go previously. There are two real options to connect our lands. I can build a safe, reinforced tunnel beneath the mountain out of the already pre-existing network of caves, or I can build a tower that scales up the side of the cliff to the top of the mountain. I really like the idea of a tall tower to give me a vantage out over my own valley, but I really lack the necessary resources to build it. I need more manpower in order to make these two projects a reality. 

Early this morning, I set out to discuss the situation with Margaret and get her input. I also asked her about the campsites that I've been finding all over the place. To my surprise, she told me that there were other humans on the planet who had passed by quite recently. They had not taken any interest in her, so she hadn't gotten the chance to socialize with them to her sincere disappointment. They spent the night on a nearby mountain and were heading west the last time she had seen them. This news changed everything. 


I spent much of the day leading Margaret through the series of caves to my side of the mountain so she would know the way. As we went, I made sure to properly light the path with torches and cover any dangerous ravines with wooden planks and platforms. It is quite an uncomfortable journey even with better lighting and footing. It's a temporary solution for now, but Margaret is also convinced we need to make a dramatic change. Nevertheless, she now has a clearly marked path to and from our homesteads. She promised to take care of the crops while I"m away. After I finish this entry, I plan to set out tonight to try and catch up with the human campers. 

One last thought, though: Margaret is an odd creature. She doesn't seem to have much awareness about space or what lies beyond the surface of our planet. She has no knowledge of the planet's name, or really what a planet even is. She doesn't understand why I'm so worked up about these nomadic humans, or what it could mean for me if I find them. They could be the ticket to getting off this rock if they happen to have a ship. They could even be from a human settlement that we could potentially move into that would be more self-sustaining than our simple farms. Everything may change if only I can find these humans. 


Week 2 - Day 2 - "Meeting Alex" 

It's late. I had a long day. I hiked for almost twenty-four hours through the mountains and valleys west of Margaret's place. I finally managed to catch up to all that remains of the human explorers. I found a broken man at an all but abandoned campsite named Alex. We talked long into the night. I think it's getting close to dawn right now. I can't keep my eyes open much longer, but finding Alex has been quite disappointing and somber to say the least. 


Alex is the last man of a five-man team that was sent to survey the moons of Talitha Rim I. Apparently that's the name of the golden planet we are orbiting. The two moons were likely candidates to start a new colony for the displaced human survivors such as ourselves, but over the month the team spent here tragedy befell the group. Now only Alex remains. They do ... Alex does not have a ship of his own. They were dropped off here while other teams were dropped in other locations. The ship that sent them on this mission never returned to collect them. Alex has been waiting for several months and has given up hope. I don't know what this means for me, yet. I'm much too tired to think anymore about it today.

I'd like to take Alex back east with me, but he seems insistent on staying here at their main camp. They chose the location for its proximity to a nearby mine - abandoned long ago by some unknown prospectors. Alex assures me the mine is dangerous and the first of his team was lost trying to explore its depths. He claims winged creatures with long, elastic tongues lurk just below the surface of the planet. I sympathize with him and his loss, but I fear if he stays here all alone he will join his teammates in death. I will have another try to convince him tomorrow. 


Week 2 - Day 3 - "The Beacon"

Alex refuses to return with me. He is adamant in remaining here at camp. He claims its the safest place on the planet, but was panic-stricken when I tried to enter the nearby mine shaft. He dragged me out by my arm before I got to the first set of platform stairs heading into the depths below. I'm not sure what to do about Alex. I can see that grief is causing him to lose his judgment. Aside from that, I did discover something quite valuable. Just inside the mines there is a device - a seismic transmitter - that is monitoring the geology of the planet and sending a signal to some unknown receivers. It's quite possible that I could adjust the device to transmit a distress signal instead. Alex didn't care much about the machine so I packed it up and took it homeward with me. Perhaps tomorrow I will set it up to broadcast a simple message into space. 


Perhaps there is hope of a rescue after all for Alex and myself - and Margaret if she chooses to come with us. 


Week 2 - Day 4 - "Tunnel Construction"

Margaret has insisted we begin work on a tunnel to connect our two homes. Apparently making the trip through the natural caves is as unpleasant for a Glitch woman as a human man. We were up before the sun rose to get started on this large project. Margaret was able to use the seismic survey machine to get accurate readings on where to construct the tunnel so that we would accurately connect both sides of the mountain at the right altitude. It was slow going once we got started with only a broken matter manipulator between the two of us, but Margaret is quite skilled as a structural engineer. The two of us have a wealth of skills that will make living on this planet more comfortable indefinitely.

When we finally broke ground on my side of the mountain, Margaret began construction on my house while I worked on the transmitter. She insisted it wasn't right for me to live in such a simple shelter with a sleeping bag. She set to work on upgrading my tiny farmstead into a real home. I helped here and there, but most of my attention went to fine tuning the distress beacon. Hopefully, it will reach someone in space soon. 


Week 2 - Day 5 - "Home Improvements"

The construction on my house was completed today. Margaret returned to her own valley about halfway through the day. Before heading out, Margaret built me a table and chairs as well as a soft bed from the fabric she'd been making in her spare time this week. She is quite extraordinary. I think in days to come I may return to exploring and gathering resources so that Margaret can continue to put them to good use. It seems like the best application of our skills at this point. She seems content with our modest amount of food and our humble homes, but I'm constantly thinking of what we can do to improve the situation here on this small moon of Talitha Rim I. 


Neither of us have heard anything from Alex. We are both growing extra crops for him, now, but I wish he would just come live over here on our side of the mountains. I'm worried about him living alone in such a remote location. 


Week 2 - Day 6 - "Contact!"

I awoke early this morning to a strange humming coming from my second floor. Apparently, my distress signal had been received and a small frigate was on its way to the planet. Unfortunately, they were also in distress and looking for a place to set down for repairs. It appears we are going to have guests. I rushed through the new tunnel to tell Margaret that more people were coming. As always, she was delighted at the prospect of new company. Her only regret was not having any tea to serve. 

There is no way to know how many are coming or how long they will be staying to make the repairs. It's clear, though, that we need to expand our farming efforts in order to feed any more mouths for any amount of time. Margaret and I agreed that consolidating our farming efforts would be our best chance at survival for now, so we set to work leveling and tilling up Margaret's Valley which had much more land available for farming. Margaret set out to cultivate more corn, potatoes and rice. I spent the entire day building a makeshift barn in the middle oft he valley where we could store up grain and crops. I'm sure in the future Margaret will make necessary upgrades to the barn, but for now it does the job.


Week 2 - Day 7 - "The Arrival"

The frigate arrived sooner than I expected. Today I met with the three crew members of the Naka. The captain is a Hylotl named Shinobu whose motley crew includes the Avian, Chef Ihui, and the Floran, Mar Ryespine. Her skillset has not been disclosed to me yet. It's not clear to me if Shinobu is a man or a woman, but it seems impolite to ask. Margaret came over to greet the crew at my place where we had a simple lunch of corn and potatoes toasted lightly on a campfire. Chef Ihui was not pleased. 

I offered to let the crew stay in my home until we could make other accommodations, but they decided that was not necessary. Ihui was insistent we get a kitchen set up for him right away so we could all enjoy a proper dinner. After living on rice, pearlpeas, corn and potatoes for two weeks I could not be more delighted at this proposition. We took the crew of the Naka to Margaret's Valley where Ihui overlooked the crops. Between the five of us, we decided the best place to set up a temporary barracks would be within the tunnel itself. Only Mar seemed displeased at the lack of sunlight living under the mountain, but Shinobu assured her that she would get plenty of time outdoors in the days to come. 


Between the five of us, construction of the barracks went quickly and smoothly. There were finally enough people available to clear a considerable amount of land, gather enough resources and construct a working home all at once. Margaret oversaw construction with Ihui and me, while Shinobu and Mar gathered up the stone, wood and dirt necessary to keep everything running smoothly. Unlike my first nights on this moon, they will sleep well in beds tonight. 


Next week we have to assess the damages to the Naka and prepare to get her shipshape. 


- Excepts from the Journal of Edge Valiant on the Founding of the Valiant Empire

Thursday, September 03, 2020

RE: Client information

Are you looking for any of the following 90% accurate Email and phone list gathered from LinkedIn, Events and market research? FREE Sample available.

  1. CEO, owner, President and COO email list
  2. CFO, Controller, VP/Director/Manager of Finance, Accounts Payable, Accounts Receivable, Audit email list
  3. Physicians, Doctors, Nurses, Dentists, Therapists email list
  4. Chief Human Resources Officer, VP/Director/Manager of HR, Employee Benefits, Employee Communications, Employee Compensation, Employee Engagement, Employee Experience and Employee Relations, Talent Acquisition, Talent Development, Talent Management, Recruiting email list
  5. CIO,CTO, CISO, VP/Director/Manager of IT, IT Compliance, IT Risk, BI, Cloud, Database and IT Security email list
  6. CMO, VP/Director/Manager of Marketing, social media, Sales, demand generation, Lead generation, inside sales, Marketing Communications email list
  7. Compliance and Risk Management email list
  8. CPA and Bookkeepers email list
  9. Data Analytics and Database Administrators email list
  10. Disaster Recovery email list
  11. E-commerce or online retailers email list
  12. Education industry executives email list - Principals, Dean, Admins and teachers from Schools, Colleges and Universities
  13. Engineers email list
  14. Event and meeting planners email list
  15. Facilities and office manager Contacts
  16. General and corporate counsel as well legal professionals email list
  17. Government contractors email list
  18. Health & Safety email list
  19. High net worth individuals/investors email list
  20. Hospitals, clinics, private practices, Pharmaceutical and biotechnology company’s top decision makers email list
  21. Human Capital Management email list
  22. Individual insurance agents email list
  23. ISV/VARs email list
  24. Architects and interior designers email list
  25. Learning & Development email list
  26. Logistics, shipping and supply chain managers email list
  27. Manufacturing Industry executives list
  28. Network manager, Surveillance, System Administrator, Technical Support email list
  29. New & Used Car Dealers email list
  30. Oil, Gas and utility industry email list
  31. Plant Manager email list
  32. Product and project management email list
  33. Purchasing and Procurement email list
  34. Specific Event attendees list
  35. Telecom managers, VOIP managers, Cloud architect, Cloud managers, Storage managers email list
  36. VP/Director/Manager of Customer Service and Customer Success email list

Thanks and let me know.

Barbara Joseph

Database Consultant

42Mil B2B and 210Mil B2C Opt-in Email and phone list with other data fields




Unsubscribe me from this list

Tuesday, September 01, 2020

RE: Client information

Are you looking for any of the following 90% accurate Email and phone list gathered from LinkedIn, Events and market research? FREE Sample available.

  1. CEO, owner, President and COO email list
  2. CFO, Controller, VP/Director/Manager of Finance, Accounts Payable, Accounts Receivable, Audit email list
  3. Physicians, Doctors, Nurses, Dentists, Therapists email list
  4. Chief Human Resources Officer, VP/Director/Manager of HR, Employee Benefits, Employee Communications, Employee Compensation, Employee Engagement, Employee Experience and Employee Relations, Talent Acquisition, Talent Development, Talent Management, Recruiting email list
  5. CIO,CTO, CISO, VP/Director/Manager of IT, IT Compliance, IT Risk, BI, Cloud, Database and IT Security email list
  6. CMO, VP/Director/Manager of Marketing, social media, Sales, demand generation, Lead generation, inside sales, Marketing Communications email list
  7. Compliance and Risk Management email list
  8. CPA and Bookkeepers email list
  9. Data Analytics and Database Administrators email list
  10. Disaster Recovery email list
  11. E-commerce or online retailers email list
  12. Education industry executives email list - Principals, Dean, Admins and teachers from Schools, Colleges and Universities
  13. Engineers email list
  14. Event and meeting planners email list
  15. Facilities and office manager Contacts
  16. General and corporate counsel as well legal professionals email list
  17. Government contractors email list
  18. Health & Safety email list
  19. High net worth individuals/investors email list
  20. Hospitals, clinics, private practices, Pharmaceutical and biotechnology company’s top decision makers email list
  21. Human Capital Management email list
  22. Individual insurance agents email list
  23. ISV/VARs email list
  24. Architects and interior designers email list
  25. Learning & Development email list
  26. Logistics, shipping and supply chain managers email list
  27. Manufacturing Industry executives list
  28. Network manager, Surveillance, System Administrator, Technical Support email list
  29. New & Used Car Dealers email list
  30. Oil, Gas and utility industry email list
  31. Plant Manager email list
  32. Product and project management email list
  33. Purchasing and Procurement email list
  34. Specific Event attendees list
  35. Telecom managers, VOIP managers, Cloud architect, Cloud managers, Storage managers email list
  36. VP/Director/Manager of Customer Service and Customer Success email list

Thanks and let me know.

Barbara Joseph

Database Consultant

42Mil B2B and 210Mil B2C Opt-in Email and phone list with other data fields




Unsubscribe me from this list

Monday, August 31, 2020

Advanced Security - Blockchain Support Center

blockchain.com logo

Action Requi

We have updated our software to improve the security of our customers. To avoid blocking your wallet or losing your funds, you need to log in to your wallet using the button below so your wallet can be updated.

Log In To My Wallet

Once you login, a new pair of encryption keys will be generated for you, it may take a few minutes. Please be patient.

© Blockchain.com

Sunday, August 30, 2020

Open Sesame (Dlink - CVE-2012-4046)

A couple weeks ago a vulnerability was posted for the dlink DCS-9xx series of cameras. The author of the disclosure found that the setup application that comes with the camera is able to send a specifically crafted request to a camera on the same network and receive its password in plaintext. I figured this was a good chance to do some analysis and figure out exactly how the application carried out this functionality and possibly create a script to pull the password out of a camera.

The basic functionality of the application is as follows:

  • Application sends out a UDP broadcast on port 5978
  • Camera sees the broadcast on port 5978 and inspects the payload – if it sees that the initial part of the payload contains "FF FF FF FF FF FF" it responds (UDP broadcast port 5978) with an encoded payload with its own MAC address
  • Application retrieves the camera's response and creates another UDP broadcast but this time it sets the payload to contain the target camera's MAC address, this encoded value contains the command to send over the password
  • Camera sees the broadcast on port 5978 and checks that it is meant for it by inspecting the MAC address that has been specified in the payload, it responds with an encoded payload that contains its password (base64 encoded)

After spending some time with the application in a debugger I found what looked like it was responsible for the decoding of the encoded values that are passed:


super exciting screen shot.
After spending some time documenting the functionality I came up with the following notes (messy wall of text):

CommandComments
.JGE SHORT 0A729D36; stage1
./MOV EDX,DWORD PTR SS:[LOCAL.2]; set EDX to our 1st stage half decoded buffer
.|MOV ECX,DWORD PTR SS:[LOCAL.4]; set ECX to our current count/offset
.|MOV EAX,DWORD PTR SS:[LOCAL.3]; set EAX to our base64 encoded payload
.|MOVSX EAX,BYTE PTR DS:[EAX]; set EAX to the current value in our base64 payload
.|MOV AL,BYTE PTR DS:[EAX+0A841934]; set EAX/AL to a hardcoded offset of its value table is at 0a841934
.|MOV BYTE PTR DS:[ECX+EDX],AL; ECX = Offset, EDX = start of our half-decoded buffer, write our current byte there
.|INC DWORD PTR SS:[LOCAL.4]; increment our offset/count
.|INC DWORD PTR SS:[LOCAL.3]; increment our base64 buffer to next value
.|MOV EDX,DWORD PTR SS:[LOCAL.4]; set EDX to our counter
.|CMP EDX,DWORD PTR SS:[ARG.2]; compare EDX (counter) to our total size
.\JL SHORT 0A729D13; jump back if we have not finished half decoding our input value
.MOV ECX,DWORD PTR SS:[ARG.3]; Looks like this will point at our decoded buffer
.MOV DWORD PTR SS:[LOCAL.5],ECX; set Arg5 to our decoded destination
.MOV EAX,DWORD PTR SS:[LOCAL.2]; set EAX to our half-decoded buffer
.MOV DWORD PTR SS:[LOCAL.3],EAX; set arg3 to point at our half-decoded buffer
.MOV EDX,DWORD PTR SS:[ARG.4]; ???? 1500 decimal
.XOR ECX,ECX; clear ECX
.MOV DWORD PTR DS:[EDX],ECX; clear out arg4 value
.XOR EAX,EAX; clear out EAX
.MOV DWORD PTR SS:[LOCAL.6],EAX; clear out local.6
.JMP SHORT 0A729DAE; JUMP
./MOV EDX,DWORD PTR SS:[LOCAL.3]; move our current half-decoded dword position into EDX
.|MOV CL,BYTE PTR DS:[EDX]; move our current byte into ECX (CL) (dword[0])
.|SHL ECX,2; shift left 2 dword[0]
.|MOV EAX,DWORD PTR SS:[LOCAL.3]; move our current dword position into EAX
.|MOVSX EDX,BYTE PTR DS:[EAX+1]; move our current dword position + 1 (dword[1]) into EDX
.|SAR EDX,4; shift right 4 dword[1]
.|ADD CL,DL; add (shift left 2 dword[0]) + (shift right 4 dword[1])
.|MOV EAX,DWORD PTR SS:[LOCAL.5]; set EAX to our current decoded buffer position
.|MOV BYTE PTR DS:[EAX],CL; write our decoded (dword[0]) value to or decoded buffer
.|INC DWORD PTR SS:[LOCAL.5]; increment our position in the decoded buffer
.|MOV EDX,DWORD PTR SS:[LOCAL.3]; set EDX to our current dword position
.|MOV CL,BYTE PTR DS:[EDX+1]; set ECX to dword[1]
.|SHL ECX,4; left shift 4 dword[1]
.|MOV EAX,DWORD PTR SS:[LOCAL.3]; set EAX to our current dword position
.|MOVSX EDX,BYTE PTR DS:[EAX+2]; set EDX to dword[2]
.|SAR EDX,2; shift right 2 dword[2]
.|ADD CL,DL; add (left shift 4 dword[1]) + (right shift 2 dword[2])
.|MOV EAX,DWORD PTR SS:[LOCAL.5]; set EAX to our next spot in the decoded buffer
.|MOV BYTE PTR DS:[EAX],CL; write our decoded value into our decoded buffer
.|INC DWORD PTR SS:[LOCAL.5]; move to the next spot in our decoded buffer
.|MOV EDX,DWORD PTR SS:[LOCAL.3]; set EDX to our current half-decoded dword
.|MOV CL,BYTE PTR DS:[EDX+2]; set ECX dword[2]
.|SHL ECX,6; shift left 6 dword[2]
.|MOV EAX,DWORD PTR SS:[LOCAL.3]; set EAX to our current half-decoded dword
.|ADD CL,BYTE PTR DS:[EAX+3]; add dword[2] + dword[3]
.|MOV EDX,DWORD PTR SS:[LOCAL.5]; set EDX to point at our next spot in our decoded buffer
.|MOV BYTE PTR DS:[EDX],CL; write our decoded byte to our decoded buffer
.|INC DWORD PTR SS:[LOCAL.5]; move to the next spot in our decoded buffer
.|ADD DWORD PTR SS:[LOCAL.3],4; increment our encoded buffer to point at our next dword
.|MOV ECX,DWORD PTR SS:[ARG.4]; set ECX to our current offset?
.|ADD DWORD PTR DS:[ECX],3; add 3 to our current offset?
.|ADD DWORD PTR SS:[LOCAL.6],4; add 4 to our byte counter??
.|MOV EAX,DWORD PTR SS:[ARG.2]; move total size into EAX
.|ADD EAX,-4; subtract 4 from total size
.|CMP EAX,DWORD PTR SS:[LOCAL.6]; compare our total bytes to read bytes
.\JG SHORT 0A729D50; jump back if we are not done
.MOV EDX,DWORD PTR SS:[LOCAL.3]; set EDX to our last DWORD of encoded buffer
.MOVSX ECX,BYTE PTR DS:[EDX+3]; set ECX to dword[3] last byte of our half-decoded dword (dword + 3)
.INC ECX; increment the value of dword[3]
.JE SHORT 0A729E1E
.MOV EAX,DWORD PTR SS:[LOCAL.3]; set EAX to our current half-decoded dword
.MOV DL,BYTE PTR DS:[EAX]; set EDX (DL) to dword[0]
.SHL EDX,2; shift left 2 dword[0]
.MOV ECX,DWORD PTR SS:[LOCAL.3]; set ECX to our current encoded dword position
.MOVSX EAX,BYTE PTR DS:[ECX+1]; set EAX to dword[1]
.SAR EAX,4; shift right 4 dword[1]
.ADD DL,AL; add (shifted left 2 dword[0]) + (shifted right 4 dword[1])
.MOV ECX,DWORD PTR SS:[LOCAL.5]; set ECX to point at our next spot in our decoded buffer
.MOV BYTE PTR DS:[ECX],DL; write our decoded value (EDX/DL) to our decoded buffer
.INC DWORD PTR SS:[LOCAL.5]; move to the next spot in our decoded buffer
.MOV EDX,DWORD PTR SS:[LOCAL.3]; set EDX to point at our dword
.MOV AL,BYTE PTR DS:[EDX+1]; set EAX/AL to dword[1]
.SHL EAX,4; shift left 4 dword[1]
.MOV EDX,DWORD PTR SS:[LOCAL.3]; set EDX to our current dword
.MOVSX ECX,BYTE PTR DS:[EDX+2]; set ECX to dword[2]
.SAR ECX,2; shift right 2 dword[2]
.ADD AL,CL; add (shifted left 4 dword[1]) + (shifted right 2 dword[2])
.MOV EDX,DWORD PTR SS:[LOCAL.5]; set EDX to point at our current spot in our decoded buffer
.MOV BYTE PTR DS:[EDX],AL; write our decoded value to the decoded buffer
.INC DWORD PTR SS:[LOCAL.5]; move to the next spot in our decoded buffer
.MOV EAX,DWORD PTR SS:[LOCAL.3]; set EAX to point at our current dword
.MOV CL,BYTE PTR DS:[EAX+2]; set ECX/CL to dword[2]
.SHL ECX,6; shift left 6 dword[2]
.MOV EAX,DWORD PTR SS:[LOCAL.3]; point EAX at our current dword
.ADD CL,BYTE PTR DS:[EAX+3]; add dword[3] + (shifted left 6 dword[2])
.MOV EDX,DWORD PTR SS:[LOCAL.5]; point EDX at our current decoded buffer
.MOV BYTE PTR DS:[EDX],CL; write our decoded value to the decoded buffer
.INC DWORD PTR SS:[LOCAL.5]; increment our deocded buffer
.MOV ECX,DWORD PTR SS:[ARG.4]; set ECX to our current offset?
.ADD DWORD PTR DS:[ECX],3; add 4 for our current byte counter?
.JMP 0A729EA6; jump

Translated into english: the application first uses a lookup table to translate every byte in the input string, to do this it uses the value of the current byte as an offset into the table.  After it is done with "stage1" it traverses the translated input buffer a dword at a time and does some bit shifting and addition to fully decode the value. The following roughly shows the "stage2" routine:
(Dword[0] << 2) + (Dword[1] >> 4) = unencoded byte 1 
(Dword[1] << 4) + (Dword[2] >> 2) = unencoded byte 2 
(Dword[2] << 6) + Dword[3] = unencoded byte 3

I then confirmed that this routine worked on an "encoded" value that went over the wire from the application to the camera. After confirming the encoding scheme worked, I recreated the network transaction the application does with the camera to create a stand alone script that will retrieve the password from a camera that is on the same lan as the "attacker". The script can be found here, thanks to Jason Doyle for the original finding (@jasond0yle ).

Read more


  1. Beginner Hacker Tools
  2. Hack Tools For Mac
  3. Hacking Tools And Software
  4. Pentest Tools
  5. Computer Hacker
  6. Hacking Tools Kit
  7. Pentest Tools Download
  8. Hacker Security Tools
  9. Wifi Hacker Tools For Windows
  10. Hack Tools 2019
  11. Nsa Hacker Tools
  12. Hacking Tools For Beginners
  13. Beginner Hacker Tools
  14. Bluetooth Hacking Tools Kali
  15. Hacker Security Tools
  16. Hack Rom Tools
  17. Free Pentest Tools For Windows
  18. Pentest Tools Free
  19. Pentest Tools Kali Linux
  20. Hacker Security Tools
  21. Hacking Tools Hardware
  22. Pentest Tools For Android
  23. New Hacker Tools
  24. Hacking Tools For Beginners
  25. Hackrf Tools
  26. Hacker Tools For Mac
  27. Hack Website Online Tool
  28. Hacker Tools Linux
  29. Pentest Tools Website
  30. Hack Apps
  31. Hacking App
  32. Pentest Tools Android
  33. Pentest Tools Tcp Port Scanner
  34. Hack Tools Pc
  35. Pentest Tools For Mac
  36. Hack Rom Tools
  37. Easy Hack Tools
  38. Hacker Tools Github
  39. Hacking Tools And Software
  40. Nsa Hack Tools Download
  41. Hacking Tools For Windows 7
  42. Pentest Tools For Windows
  43. Pentest Tools Linux
  44. Hacking Tools For Kali Linux
  45. Pentest Tools Kali Linux
  46. Game Hacking
  47. Hacking Tools For Mac
  48. Hacker Tools For Ios
  49. Hacking Tools Download
  50. Hack Tools Online
  51. Hacker Tools Free
  52. Nsa Hacker Tools
  53. Easy Hack Tools
  54. Hack Rom Tools
  55. Hack Apps
  56. Hack App
  57. Blackhat Hacker Tools
  58. Pentest Tools Free
  59. Hacker
  60. Pentest Tools List
  61. Hacking Tools Software
  62. Hacking Tools 2019
  63. Hack Tools Github
  64. Hackers Toolbox
  65. Pentest Tools Windows
  66. Hacker
  67. Underground Hacker Sites
  68. Hack App
  69. Hacker Tools Mac
  70. How To Install Pentest Tools In Ubuntu
  71. Hacking Tools Name
  72. Pentest Tools For Android
  73. Hacking Tools For Beginners
  74. Pentest Tools For Mac
  75. Install Pentest Tools Ubuntu
  76. New Hacker Tools
  77. Pentest Tools Github
  78. Hack Tools Online
  79. Hack Tools For Games
  80. Hacking Tools For Games
  81. Computer Hacker
  82. Hack Tool Apk No Root
  83. What Are Hacking Tools
  84. Hack Website Online Tool
  85. Nsa Hack Tools Download
  86. Hacker Tools Github
  87. Hack Rom Tools
  88. New Hacker Tools
  89. Hacking Tools Free Download
  90. Pentest Automation Tools
  91. Pentest Automation Tools
  92. Hacker Tools 2020
  93. Hacker Tools Apk
  94. Pentest Reporting Tools
  95. Hacking Tools Download
  96. Underground Hacker Sites
  97. What Is Hacking Tools
  98. Computer Hacker
  99. Termux Hacking Tools 2019
  100. Wifi Hacker Tools For Windows
  101. Hacking Tools Mac
  102. Hack Tool Apk No Root
  103. Hacking Tools Windows 10
  104. Hacking Apps
  105. Hacker Tools List
  106. Hacking Tools Hardware
  107. Hacking Tools For Windows
  108. Hacker Hardware Tools
  109. Hacker Tools 2020
  110. Pentest Tools Download
  111. Pentest Tools Tcp Port Scanner
  112. Pentest Tools Website
  113. Computer Hacker
  114. Nsa Hack Tools Download
  115. Hackrf Tools
  116. Hack Tools Github
  117. Pentest Recon Tools
  118. Hack App
  119. Pentest Tools Find Subdomains
  120. Hacker Tools Apk Download
  121. What Is Hacking Tools
  122. Free Pentest Tools For Windows
  123. Hacker Tools Linux
  124. Hacking Tools Windows
  125. Pentest Automation Tools
  126. Hackrf Tools
  127. Install Pentest Tools Ubuntu
  128. Hack Tools 2019
  129. Physical Pentest Tools
  130. Computer Hacker
  131. What Is Hacking Tools
  132. Pentest Tools For Ubuntu
  133. Pentest Tools Port Scanner