Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
350 topics in this forum
-
mistake found in the tutorial.
by flamshlo- 1 reply
- 5.1k views
snd-reversingwithlena-tutorial03.tutorial. i think there is an error in the tutorial, where nops are added starting at address 401039. it is obvious (to me) that the nops start at one previous instruction at 401034. these tutorials are fabulous. i would like to point out that to move the explanations along there is no need to keep pressing the mouse in the right corner. there is a step key at the bottom of each tutorial for moving in BOTH directions without having to exit the tutorial. i am using chrome and have enabled the SWF file to run without using the htm format. if someone has pointed out the error please ignore this essay.
-
Ios App Reverse Engineering...
by Teddy Rogers- 1 reply
- 5.4k views
Ios App Reverse Engineering Sample: https://www.dropbox.com/s/on5f1yy9cq0wuvd/iOSAppReverseEngineering_Sample.pdf http://iosre.com/t/ios-app-reverse-engineering-the-worlds-1st-book-of-very-detailed-ios-app-reverse-engineering-skills/1117 Ted.
-
Decompile dll obfscutated with confuser 1.9
by real-wife- 3 replies
- 7.9k views
Hello, I did use Net reflector and 9RAYS spices decompiler but delegates methods are problematic.. Any help? Kisses
-
ESET Crackme Challenge 2015
by Levis- 9 replies
- 11.9k views
Original Post: crackme2015.zip
-
- 3 replies
- 5.9k views
Here is my new tutorial for unpacking the DRM management solution called ClickLocker. This tutorial is intended to expose the author's large exaggerations of ClickLocker's security. Tutorial: http://reverseengineeringtips.blogspot.com/2015/02/the-exagerated-promises-of-clicklocker.html
-
Keygenning With Delphi: Useful Delphi Functions and Tips
by chessgod101- 5 replies
- 6.9k views
Here is a short article I created about some of the useful functions and tricks for manipulating data for keygenning purposes in delphi. It is intended for beginners, but shows some tricks for overcoming some of the limitations in delphi. I will expand this from time to time to shed some light on some of the tricks that you can use to accomplish difficult tasks in delphi. I hope you enjoy: http://reverseengineeringtips.blogspot.com/2014/12/keygenning-with-delphi-useful-delphi.html
-
Video tutorial - how make skins for dUP2. 1 2
by Diver- 1 follower
- 32 replies
- 27.6k views
A large lesson on creating skins for the dUP2 Manufacture of skins for the dUP2, starting with Photoshop - finishing with dUP2. Parts: Part 1 - Photoshop. Steps: Change the main window Create buttons Create mask for RGNerator Create index of Main Window Create a window "About" Part 2 - RGNerator. Part 3 - ResHacker. Part 4 - DUP2. ==================================== Tools: 1 Photoshop. 2 RGNerator. 3 ResHacker. 4 dUP 2.21. ==================================== ==================================== Info: Format: SWF Time: 42 min. Size: 52 mb. Download Video-tut Tools - contains Adobe Photo…
-
- 5 replies
- 9k views
Here is my new tutorial for unpacking Jar2Exe. It demonstrates how to recover a jar file at all 3 protection settings. I hope you enjoy. http://reverseengineeringtips.blogspot.com/2014/12/unpacking-jar2exe-21-extracting-jar.html
-
Unpacking Launch4j: Extracting The Jar File
by chessgod101- 1 reply
- 6.7k views
I just published my first tutorial/article on my new blog for unpacking/extracting the original Jar archive/executable from a Java application that is wrapped in Launch4j. I also included the steps to recover command line arguments that launch4j passes to the java runtime. I hope that you enjoy and learn a few things. Link: http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html'>>http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html
-
Android Hackmes
by Loki- 1 reply
- 23k views
The Carnal0wnage blog has put up a nice summary of Android hackme/crackme challenges for those interested. http://carnal0wnage.attackresearch.com/2013/08/want-to-break-some-android-apps.html Have fun! -------------------------------------------- Android App testing requires some diverse skills depending on what you're trying to accomplish. Some app testing is like forensics, there's a ton of server side stuff with web services, and there's also times when you need to show failings in programmatic protections or features which requires reversing, debugging, or patching skills.To develop these skills you need some practice targets. Here's a list of all known Android s…
-
Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions...
by Teddy Rogers- 0 replies
- 5k views
Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions http://scrammed.blogspot.com.au/2014/10/code-obfunscation-mixing-32-and-64-bit.html Ted.
-
x86obf KeyGenMe #1
by bofstoff- 2 replies
- 9.4k views
x86obf will feature regular KeyGenMe contests with prize money for the first person/team to solve the task before the deadline.The first x86obf KeyGenMe contest has been released (prize is $100). The binary, rules and other information is in a .zip archive - download link is on the left side of this page. More info here: http://x86obf.com/contest.php
-
New RCE blog
by Aguila- 9 replies
- 8k views
I thought that it is nice to have an own blog... so here it is. Bookmark it https://ntquery.wordpress.com
-
Bitcoin vs. The NSA’s Quantum Computer...
by Teddy Rogers- 3 replies
- 8.9k views
Bitcoin vs. The NSA’s Quantum Computer This turned out to be a really interesting read. Whether your into Bitcoin or not I recommend you take a look... http://www.bitcoinnotbombs.com/bitcoin-vs-the-nsas-quantum-computer/ Ted.
-
Flare-On 1
by DrkMND- 2 replies
- 147 views
I'm hoping someone can lend me a hand. I'm working on trying to figure out a reverse engineering challenge and I'm stuck. There is no monetary reward or anything of the sort for the challenge. I'm simply interested in figuring out what I'm doing wrong so I can learn from it. The challenge for anyone that is interested is hosted at http://www.flare-on.com/ by FireEye Labs. This particular challenge give you an html file that is supposedly attacked and they ask what the attackers changed in the site. Upon review there is obfuscated php code appended to the end of the png file on the site and an include statement added to the html. The challenge is to find an email ad…
-
AnonW0rmer tracked down by iPhone EXIF picture...
by Teddy Rogers- 13 replies
- 11k views
Good forensic/detective work by the FBI from photographs taken with Apple's iPhone and EXIF... http://www.voiceofgr...cker-after.html Ted.
-
A Letter From US Security Researchers...
by Teddy Rogers- 0 replies
- 5.4k views
A Letter From US Security Researchers http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html Ted.
-
Disassembler Mechanized...
by Teddy Rogers- 2 replies
- 5.4k views
Disassembler Mechanized Disassembler Mechanized: Part 1 – Coding of Disassembler Disassembler Mechanized: Part 2 – Generating C# and MSIL code Ted.
-
Evaluation of Consumer Windows OS Security Architecture...
by Teddy Rogers- 0 replies
- 4.8k views
Evaluation of Consumer Windows OS Security Architecture http://www.invisiblethingslab.com/resources/2014/A%20crack%20on%20the%20glass.pdf Ted.
-
TrueCrypt Master Key Extraction And Volume Identification...
by Teddy Rogers- 2 replies
- 5.6k views
TrueCrypt Master Key Extraction And Volume Identification http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.
-
Hack in the Box Magazine...
by Teddy Rogers- 4 replies
- 14.4k views
Hack in the Box 6 has been published... />http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-006.pdf Ted.
-
FBI - Piecing Together Digital Evidence...
by Teddy Rogers- 2 replies
- 5.4k views
An article from the FBI... http://www.fbi.gov/news/stories/2013/january/piecing-together-digital-evidence/piecing-together-digital-evidence Ted.
-
Anti-Reverse Engineering (Assembly Obfuscation)
by Teddy Rogers- 1 follower
- 3 replies
- 7.9k views
Anti-Reverse Engineering (Assembly Obfuscation) http://resources.infosecinstitute.com/anti-reverse-engineering-assembly-obfuscation/ Ted.
-
- 0 replies
- 6.1k views
A (relatively easy to understand) primer on elliptic curve cryptography... http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ Ted.
-
DARPA Cyber Grand Challenge...
by Teddy Rogers- 0 replies
- 5.6k views
DARPA Cyber Grand Challenge Cyber Grand Challenge Rules... CyberGrandChallenge_Rules.pdf http://www.darpa.mil/cybergrandchallenge/ Ted.