Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
350 topics in this forum
-
Fourth Annual Flare-On Challenge
by Loki- 0 replies
- 7.5k views
The fourth annual Flare-On Challenge – the FireEye Labs Advanced Reverse Engineering (FLARE) team’s yearly reverse engineering contest – is scheduled to kick off on Sept. 1, 2017, at 8pm ET. This is a CTF-style challenge for all active and aspiring reverse engineers, malware analysts, and security professionals. Dust off your disassembler, put a new coat of oil on your old debugger, and get your favorite chat client ready to futilely beg your friends for help. As always, this contest is designed for individuals, not teams, and there is only one track of challenges. The contest runs for six full weeks and ends on Oct. 13, 2017, at 8pm ET. This year’s contest is the la…
-
- 0 replies
- 6k views
interesting research showing methods used to develop jailbreaks and dump apple watch kernel https://speakerdeck.com/mbazaliy/jailbreaking-apple-watch code posted to decrypt/dump the OS that handles all the secure stuff in your iphone. very cool. http://www.iclarified.com/62025/hacker-decrypts-apples-secure-enclave-processor-sep-firmware code: https://github.com/xerub/img4lib massive contribution by xerub
-
LabyREnth Capture the Flag (CTF) Challenge - 2017 1 2 3 4
by crystalboy- 92 replies
- 38.3k views
Official site: http://labyrenth.com/Announcement: https://researchcenter.paloaltonetworks.com/2017/04/unit42-labyrenth-ctf-2017/
-
movfuscator
by Loki- 13 replies
- 15.2k views
Following the publication of a paper which proves that using 'mov' is turing complete (http://www.cl.cam.ac.uk/~sd601/papers/mov.pdf) someone has written a mov only compiler.
-
NSA posts tools on GitHub
by whoknows- 0 replies
- 6.1k views
https://nationalsecurityagency.github.io/ src - https://nakedsecurity.sophos.com/2017/06/21/news-in-brief-wannacry-knocks-out-honda-plant-skype-hit-by-global-outage-nsa-shares-tools-on-github/
-
IDA Pro: News about the x64 edition
by whoknows- 1 reply
- 5.9k views
http://www.hexblog.com/?p=1096
-
A Couple of Nice Papers
by Techlord- 1 reply
- 5.9k views
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping : Get it HERE . Targeting Infeasibility Questions on Obfuscated Codes : Get it HERE .
-
- 1 reply
- 5.6k views
Scary new malware can take over your Android phone and you won’t even know it
-
- 0 replies
- 5k views
Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution
-
- 5 replies
- 7.5k views
Hi Guys. Course is done, there are currently 59 chapters. https://www.youtube.com/playlist?list=PL59fvn5FIiQG0CrnALLgXzdpDTOk0hrz2
-
CrackMe - Anti-Debug
by imaqt- 2 replies
- 8.1k views
Hello everyone, the "shabak" (israel security office have posted 3 challenges on their website. iv managed to solve the first 2 and now im hard stuck on this last one. they gave a huge hint there but im still unable to solve this. Im really curious how the 3rd one works and ill ne glad if someone will be able to teach me. Have fun!, ill add the other 2 executables just for the sport. Password: Challenge Airplane_1_the_best_researcher.rar Airplane_2_should_work.rar Airplane_3_with_the_best.rar
-
Android Applications Reversing 101
by Teddy Rogers- 0 replies
- 5.7k views
Android Applications Reversing 101 https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/ Ted.
-
- 0 replies
- 6.1k views
NSA-leaking Shadow Brokers just dumped its most damaging release yet (15/April) https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/ Analyzing the doublepulsar kernel dll injection technique https://countercept.com/our-thinking/analyzing-the-doublepulsar-kernel-dll-injection-technique/ DoublePulsar Initial SMB Backdoor Ring 0 Shellcode Analysis https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html
-
NSA Exploit Kit (Decrypted Files)
by Techlord- 0 replies
- 6.7k views
NSA Exploit Kit (Decrypted Files) - Confirmed by Snowden Himself on TWITTER to be the REAL DEAL : As can be seen from this news article from August last year : Hackers Steal NSA Exploit Kit and Put it up for Auction , there were TWO sets of archives that contained the "Spying Tools" of the NSA. The FREE version was made available last year itself. The OTHER one (nicknamed the "Auction Version") was been sold for huge sums of money (Around 100 bitcoins). Yesterday, the decrypted files from the AUCTION version were also released. Link to Decrypted Version of the AUCTION FILES ARCHIVE files : Code: https://github.com/x0rz/EQGRP The Decryp…
-
Remote code execution triggered by malformed GIF in ImageIO framework, affecting most iOS/macOS apps
by whoknows- 0 replies
- 4.8k views
https://blog.flanker017.me/cve-2017-2416-gif-remote-exec/
-
- 0 replies
- 4.9k views
https://blog.fortinet.com/2017/04/05/how-to-repair-a-dex-file-in-which-some-key-methods-are-erased-with-nops
-
Explained: Packer, Crypter, and Protector
by Teddy Rogers- 0 replies
- 5.9k views
Explained: Packer, Crypter, and Protector https://blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/ Ted.
-
What are exploits? (And why you should care)
by Teddy Rogers- 0 replies
- 4.9k views
What are exploits? (And why you should care) https://blog.malwarebytes.com/101/2017/03/what-are-exploits-and-why-you-should-care/ Ted.
-
The AnC Attack...
by Teddy Rogers- 1 reply
- 12.4k views
The AnC Attack https://www.vusec.net/projects/anc/ Ted.
-
Practical Android Debugging via KGDB...
by Teddy Rogers- 0 replies
- 6.7k views
Practical Android Debugging via KGDB http://blog.trendmicro.com/trendlabs-security-intelligence/practical-android-debugging-via-kgdb/ Ted.
-
Technical developments in Cryptography: 2016 in Review
by Teddy Rogers- 0 replies
- 6k views
Technical developments in Cryptography: 2016 in Review https://www.eff.org/deeplinks/2016/12/what-happened-crypto-2016 Ted.
-
- 0 replies
- 6.9k views
This blog post talks about some tips of using the Reflexil plugin. http://dotnetthoughts.net/how-to-reverse-engineer-net-applications-a-quick-guide/
-
Breaking Software Protection - Cryptosystem
by HellRaider- 2 replies
- 7.1k views
These are some really nice tutorial that i found on Crypto... http://resources.infosecinstitute.com/breaking-software-protection-rsa/ http://resources.infosecinstitute.com/breaking-software-protection-elgamal-signature-scheme/ http://resources.infosecinstitute.com/breaking-software-protection-dsadss/ Thanks
-
Paul Mason Tutrials
by Sniper.ps- 0 replies
- 5.3k views
Hello Guys am ask about the Paul Mason All his great Tutrials because his blog removed before a time the tutrials talk about many thing in .net reverse engineering ,but some links and pictures did not works this is the blog from web archive https://web.archive.org/web/20101204034644/http://blog.paul-mason.co.nz/ Thank of all
-
How to write a CrackMe for a CTF competition
by Bartosz Wójcik- 0 replies
- 6.1k views
With the growing popularity of CTF (capture the flag) competitions, and the excellent performance of Polish teams like Dragon Sector in this area, I thought it would be interesting to demonstrate the construction of a simple CrackMe, using some creative techniques which make it difficult to crack and analyse. If you have ever been curious about reverse engineering, entered a CTF competition, or wanted to create your own CrackMe and drive other contestants crazy, this article is for you. https://www.pelock.com/articles/how-to-write-a-crackme-for-a-ctf-competition Sources at GitHub with english comments https://github.com/PELock/CrackMeZ3S-CTF-Crac…