eddy22's blog

bindump & bin2file ... and steganography 4 fun

Certainly many people recognized Lena in some earlier post on bindump or bin2file and asked to themselves: "WTH? Why keeping Lena in the article?".
In fact the image of Lena is usually used (among other) for steganography... but I never say anything about it... not yet (-:


After writing bindump I thought: "Ok... and now?"
Now I have the opportunity to redirect bindump's output in a text file and _manage every single bit_ of _every file_.

But... after having modified the bits of the text file, what could I do with them?
Actually nothing! |-:
So the second step starts: bin2file.


Everybody knowns that computers works only with 0 and 1... and a bit of entropy that makes everything bizarre (-:
But when you see a video or an image, when you hear music or surf the net it is strange to think that it's all 0 and 1, isn't it?
Well, now you can see all files in binary mode with bindump.

To show how bindump works I use first a text file and then a bmp image of Lena:


Pirate Party (festa dei pirati) 28 Mar 2009 in Rome

Last saturday I went to this party organized by Loop magazine and the associations: Frontiere Digitali, Scambio Etico, Partito Pirata, TNT Village p2p community, Linux Club, Free Hardware Foundation, REFF (RomaeuropaFAKEFactory), Cooper editore, [A]rtis[O]pen[S]ource, LPM (Live Performers Meeting), FLxER (Flash Video Mixer).

For more information: http://www.no-copyright.net

Magnus Eriksson (monki) and Johan Allgoth (kringell), cofounders of Piratbyran and The Pirate Bay, attended to this event.

Festival of Mathematics 2009 in Rome

Also this year Piergiorgio Odifreddi has organized the Festival of Mathematics in Rome. This is the third edition.

The event was set in Auditorium Parco della Musica

Festival of Mathematics - entrance

edsniff debianized

I love debian, so I built edsniff_0.1.0_i386.deb to permit all debian/ubuntu/others users to test my program using binary package.
This is a useful program to study network protocols as you can see in previous post, and if you want to test it you can install it with:

lisbeth:~# dpkg -i edsniff_0.1.0_i386.deb

To uninstall:

lisbeth:~# apt-get remove edsniff


When I began to spend my time with my first connections and I saw the blinkenlichten for every packet sent or receive, I asked to myself what was into those packets. I was very curious and I want to know what kind of information are in those packets, every form, every single bit...
For this reason is born edsniff: to show what a packet contains.
This program is thinked to learn a little pieces of networking protocol.

bypass javascript authentication

Some year ago I have come across a site that had a private section accessible only through an authentication form.

I don't like register myself!

So I look at the html source and I find a code like this:
"uhmmm... javascript... g00d" I thought (-:

In html source page that use this type of autentication you can find a tag like: <option value="John Smith|42691|NGLOQEMM">.

brute force time analysis with bash... and possible alternatives

In a old article I write a simple bash script to crack a known password in h4x0r style.

Now I would explain when this is fattibile.

Let consider a password with only 4 numbers:

eddy22@sophia:~$ echo {0..9}{0..9}{0..9}{0..9}
0000 0001 0002 0003 0004 0005 0006 0007 0008 0009 0010 0011 0012 0013 0014 0015
9984 9985 9986 9987 9988 9989 9990 9991 9992 9993 9994 9995 9996 9997 9998 9999

We have 10000 items. With 4 letters:

eddy22@sophia:~$ echo {a..z}{a..z}{a..z}{a..z}

welcome lisbeth

I'm pleased to announce the arrival of lisbeth, my new toy (-:

lisbeth - msi wind u100

The name derived from the female protagonist of the Millennium Trilogy write by Stieg Larsson... and i'm falling in love with her character.

lisbeth runs Mac OS X Leopard (10.5.6):

Syndicate content