Andrew Brooks

Andrew Brooks

Andrew is a security professional. He has a long history of tracking down back doors, finding exploits, and solving complicated problems. We wish we could tell you more, but it's classified.

Articles by Andrew Brooks

Jun 23, 2013
Andrew Brooks

I’d like to preface this by saying this post is a mile wide and an inch deep when it comes to reverse engineering on the Android platform.  However, for those who are new to mobile and looking to get a quick test environment set up, this post is for you.  We’ll assume you have a […]

Stack Trace
Jun 10, 2013
Andrew Brooks

In the world of information security, small businesses and the security needs of small businesses are often overlooked, particularly in the realm of application security.  When looking at the investment required to build a robust application security program, it really doesn’t make sense financially.  For example, an “enterprise” scanning tool, combined with the required hosting […]

Stack Trace
Jun 2, 2013
Andrew Brooks

Continuing from out last post, welcome to part 2 of our series where we’ll be covering file fuzzing as it pertains to SCAD and ICS software. You may be asking yourself why we want to look at file format fuzzing, and the answer is easy to understand.  A majority of the SCADA software I’ve looked […]

Stack Trace
May 21, 2013
Andrew Brooks

In the past few years, particularly in the wake of Stuxnet, SCADA and ICS software has come under heavy scrutiny from the security community for a variety of poor programming practices which has unearthed some critical security issues like as memory corruption attacks, hardcoded credentials, broken crypto, and web-based attacks such as SQL injection and […]

Stack Trace
May 15, 2013
Andrew Brooks

Information Security is not just an IT issue, it’s an organizational issue. When companies attempt to address the organizational impact of information security, user awareness training is always first on the to-do list.  However, in all of the security awareness training I have seen, one key component is usually left out, and that is clearly […]

Stack Trace
May 6, 2013
Andrew Brooks

It was Thursday night and I was sitting around minding my own business on the internet. While using a particular website, the UI controls started to bug out. After a few minutes of troubleshooting the obvious, I decided to open up Firebug and see why the application wasn’t behaving. After about 15 minutes, I discovered […]

Stack Trace
Apr 28, 2013
Andrew Brooks

For the most part, I rarely indulge in CTF exercises due to a combination of lacking free-time and the fact that many of the solutions are often annoyingly convoluted. The other day, someone on the reverse engineering subreddit was kind enough to post links to their web challenges and after taking a look, one of […]

Stack Trace
Apr 24, 2013
Andrew Brooks

If you recall from last week, after using using DotNetasploit, we successfully injected into the application, inspected the “Unlock” button, and discovered that clicking this button calls the function TestKey.KeyCheck(). At this point, it’s time to open our program in Gray Dragon for a deeper dive. Enter the Dragon Wolf Opening and running Gray Wolf […]

Stack Trace
Apr 16, 2013
Andrew Brooks

In 2011, I was fortunate enough to attend OWASP’s AppSec USA conference in the wonderful city if Minneapolis, MN.  While both the training and talks I attended were very good, one talk in particular stood out and that was  “Hacking .NET (C#) Applications: The Black Arts” given by a very bright individual named Jon McCoy.  […]

Stack Trace
Apr 7, 2013
Andrew Brooks

When it comes to software security testing, fuzzing is both an effective and efficient way to exercise a program’s inputs and outputs.  An introduction on fuzzing techniques and methodologies extends well beyond the scope of this post, so if you’re new to the subject, I highly recommend picking up Fuzzing: Brute Force Vulnerability Discovery and familiarizing yourself […]

Stack Trace