Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
350 topics in this forum
-
Hi everyone, This challenge has been running the past couple of days and I think many of you here will find this of interest. Its open till the 18th of July so it would be advisable to not give out any solutions until that date has passed. http://cybersecuritychallenge.org.uk/competitors/competitions-overview/ Have fun! Its seriously interesting and challenging.
-
How to determine the method of obfuscation?
-
snd-reversingwithlena-tutorial03.tutorial. i think there is an error in the tutorial, where nops are added starting at address 401039. it is obvious (to me) that the nops start at one previous instruction at 401034. these tutorials are fabulous. i would like to point out that to move the explanations along there is no need to keep pressing the mouse in the right corner. there is a step key at the bottom of each tutorial for moving in BOTH directions without having to exit the tutorial. i am using chrome and have enabled the SWF file to run without using the htm format. if someone has pointed out the error please ignore this essay.
-
Ios App Reverse Engineering Sample: https://www.dropbox.com/s/on5f1yy9cq0wuvd/iOSAppReverseEngineering_Sample.pdf http://iosre.com/t/ios-app-reverse-engineering-the-worlds-1st-book-of-very-detailed-ios-app-reverse-engineering-skills/1117 Ted.
-
Hello, I did use Net reflector and 9RAYS spices decompiler but delegates methods are problematic.. Any help? Kisses
-
-
Here is my new tutorial for unpacking the DRM management solution called ClickLocker. This tutorial is intended to expose the author's large exaggerations of ClickLocker's security. Tutorial: http://reverseengineeringtips.blogspot.com/2015/02/the-exagerated-promises-of-clicklocker.html
-
Here is a short article I created about some of the useful functions and tricks for manipulating data for keygenning purposes in delphi. It is intended for beginners, but shows some tricks for overcoming some of the limitations in delphi. I will expand this from time to time to shed some light on some of the tricks that you can use to accomplish difficult tasks in delphi. I hope you enjoy: http://reverseengineeringtips.blogspot.com/2014/12/keygenning-with-delphi-useful-delphi.html
-
A large lesson on creating skins for the dUP2 Manufacture of skins for the dUP2, starting with Photoshop - finishing with dUP2. Parts: Part 1 - Photoshop. Steps: Change the main window Create buttons Create mask for RGNerator Create index of Main Window Create a window "About" Part 2 - RGNerator. Part 3 - ResHacker. Part 4 - DUP2. ==================================== Tools: 1 Photoshop. 2 RGNerator. 3 ResHacker. 4 dUP 2.21. ==================================== ==================================== Info: Format: SWF Time: 42 min. Size: 52 mb. Download Video-tut Tools - contains Adobe Photo…
-
-
- 32 replies
- 29.3k views
- 1 follower
-
-
Here is my new tutorial for unpacking Jar2Exe. It demonstrates how to recover a jar file at all 3 protection settings. I hope you enjoy. http://reverseengineeringtips.blogspot.com/2014/12/unpacking-jar2exe-21-extracting-jar.html
-
I just published my first tutorial/article on my new blog for unpacking/extracting the original Jar archive/executable from a Java application that is wrapped in Launch4j. I also included the steps to recover command line arguments that launch4j passes to the java runtime. I hope that you enjoy and learn a few things. Link: http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html'>>http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html
-
Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions http://scrammed.blogspot.com.au/2014/10/code-obfunscation-mixing-32-and-64-bit.html Ted.
-
x86obf will feature regular KeyGenMe contests with prize money for the first person/team to solve the task before the deadline.The first x86obf KeyGenMe contest has been released (prize is $100). The binary, rules and other information is in a .zip archive - download link is on the left side of this page. More info here: http://x86obf.com/contest.php
-
I thought that it is nice to have an own blog... so here it is. Bookmark it https://ntquery.wordpress.com
-
Bitcoin vs. The NSA’s Quantum Computer This turned out to be a really interesting read. Whether your into Bitcoin or not I recommend you take a look... http://www.bitcoinnotbombs.com/bitcoin-vs-the-nsas-quantum-computer/ Ted.
-
I'm hoping someone can lend me a hand. I'm working on trying to figure out a reverse engineering challenge and I'm stuck. There is no monetary reward or anything of the sort for the challenge. I'm simply interested in figuring out what I'm doing wrong so I can learn from it. The challenge for anyone that is interested is hosted at http://www.flare-on.com/ by FireEye Labs. This particular challenge give you an html file that is supposedly attacked and they ask what the attackers changed in the site. Upon review there is obfuscated php code appended to the end of the png file on the site and an include statement added to the html. The challenge is to find an email ad…
-
Good forensic/detective work by the FBI from photographs taken with Apple's iPhone and EXIF... http://www.voiceofgr...cker-after.html Ted.
-
A Letter From US Security Researchers http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html Ted.
-
Disassembler Mechanized Disassembler Mechanized: Part 1 – Coding of Disassembler Disassembler Mechanized: Part 2 – Generating C# and MSIL code Ted.
-
Evaluation of Consumer Windows OS Security Architecture http://www.invisiblethingslab.com/resources/2014/A%20crack%20on%20the%20glass.pdf Ted.
-
TrueCrypt Master Key Extraction And Volume Identification http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.
-
Hack in the Box 6 has been published... />http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-006.pdf Ted.
-
An article from the FBI... http://www.fbi.gov/news/stories/2013/january/piecing-together-digital-evidence/piecing-together-digital-evidence Ted.
-
Anti-Reverse Engineering (Assembly Obfuscation) http://resources.infosecinstitute.com/anti-reverse-engineering-assembly-obfuscation/ Ted.
-
-
- 3 replies
- 8.5k views
- 1 follower
-
-
A (relatively easy to understand) primer on elliptic curve cryptography... http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ Ted.