Reverse Engineering Articles
Share an interesting blog, news page or other RE related site...
346 topics in this forum
-
- 3 replies
- 5.6k views
Here is my new tutorial for unpacking the DRM management solution called ClickLocker. This tutorial is intended to expose the author's large exaggerations of ClickLocker's security. Tutorial: http://reverseengineeringtips.blogspot.com/2015/02/the-exagerated-promises-of-clicklocker.html
-
Keygenning With Delphi: Useful Delphi Functions and Tips
by chessgod101- 5 replies
- 6.5k views
Here is a short article I created about some of the useful functions and tricks for manipulating data for keygenning purposes in delphi. It is intended for beginners, but shows some tricks for overcoming some of the limitations in delphi. I will expand this from time to time to shed some light on some of the tricks that you can use to accomplish difficult tasks in delphi. I hope you enjoy: http://reverseengineeringtips.blogspot.com/2014/12/keygenning-with-delphi-useful-delphi.html
-
Video tutorial - how make skins for dUP2. 1 2
by Diver- 1 follower
- 32 replies
- 26.7k views
A large lesson on creating skins for the dUP2 Manufacture of skins for the dUP2, starting with Photoshop - finishing with dUP2. Parts: Part 1 - Photoshop. Steps: Change the main window Create buttons Create mask for RGNerator Create index of Main Window Create a window "About" Part 2 - RGNerator. Part 3 - ResHacker. Part 4 - DUP2. ==================================== Tools: 1 Photoshop. 2 RGNerator. 3 ResHacker. 4 dUP 2.21. ==================================== ==================================== Info: Format: SWF Time: 42 min. Size: 52 mb. Download Video-tut Tools - contains Adobe Photo…
-
- 5 replies
- 8.6k views
Here is my new tutorial for unpacking Jar2Exe. It demonstrates how to recover a jar file at all 3 protection settings. I hope you enjoy. http://reverseengineeringtips.blogspot.com/2014/12/unpacking-jar2exe-21-extracting-jar.html
-
Unpacking Launch4j: Extracting The Jar File
by chessgod101- 1 reply
- 6.4k views
I just published my first tutorial/article on my new blog for unpacking/extracting the original Jar archive/executable from a Java application that is wrapped in Launch4j. I also included the steps to recover command line arguments that launch4j passes to the java runtime. I hope that you enjoy and learn a few things. Link: http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html'>>http://reverseengineeringtips.blogspot.com/2014/12/unpacking-launch4j-35-extracting-jar.html
-
Android Hackmes
by Loki- 1 reply
- 19.8k views
The Carnal0wnage blog has put up a nice summary of Android hackme/crackme challenges for those interested. http://carnal0wnage.attackresearch.com/2013/08/want-to-break-some-android-apps.html Have fun! -------------------------------------------- Android App testing requires some diverse skills depending on what you're trying to accomplish. Some app testing is like forensics, there's a ton of server side stuff with web services, and there's also times when you need to show failings in programmatic protections or features which requires reversing, debugging, or patching skills.To develop these skills you need some practice targets. Here's a list of all known Android s…
-
Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions...
by Teddy Rogers- 0 replies
- 4.8k views
Code obFU(N)scation Mixing 32 and 64 bit Mode Instructions http://scrammed.blogspot.com.au/2014/10/code-obfunscation-mixing-32-and-64-bit.html Ted.
-
x86obf KeyGenMe #1
by bofstoff- 2 replies
- 5.5k views
x86obf will feature regular KeyGenMe contests with prize money for the first person/team to solve the task before the deadline.The first x86obf KeyGenMe contest has been released (prize is $100). The binary, rules and other information is in a .zip archive - download link is on the left side of this page. More info here: http://x86obf.com/contest.php
-
New RCE blog
by Aguila- 9 replies
- 6.9k views
I thought that it is nice to have an own blog... so here it is. Bookmark it https://ntquery.wordpress.com
-
Bitcoin vs. The NSA’s Quantum Computer...
by Teddy Rogers- 3 replies
- 8.3k views
Bitcoin vs. The NSA’s Quantum Computer This turned out to be a really interesting read. Whether your into Bitcoin or not I recommend you take a look... http://www.bitcoinnotbombs.com/bitcoin-vs-the-nsas-quantum-computer/ Ted.
-
AnonW0rmer tracked down by iPhone EXIF picture...
by Teddy Rogers- 13 replies
- 10.5k views
Good forensic/detective work by the FBI from photographs taken with Apple's iPhone and EXIF... http://www.voiceofgr...cker-after.html Ted.
-
A Letter From US Security Researchers...
by Teddy Rogers- 0 replies
- 5.2k views
A Letter From US Security Researchers http://blog.cryptographyengineering.com/2014/01/a-letter-from-us-security-researchers.html Ted.
-
Disassembler Mechanized...
by Teddy Rogers- 2 replies
- 5.2k views
Disassembler Mechanized Disassembler Mechanized: Part 1 – Coding of Disassembler Disassembler Mechanized: Part 2 – Generating C# and MSIL code Ted.
-
Evaluation of Consumer Windows OS Security Architecture...
by Teddy Rogers- 0 replies
- 4.6k views
Evaluation of Consumer Windows OS Security Architecture http://www.invisiblethingslab.com/resources/2014/A%20crack%20on%20the%20glass.pdf Ted.
-
TrueCrypt Master Key Extraction And Volume Identification...
by Teddy Rogers- 2 replies
- 5.4k views
TrueCrypt Master Key Extraction And Volume Identification http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.
-
Hack in the Box Magazine...
by Teddy Rogers- 4 replies
- 13.2k views
Hack in the Box 6 has been published... />http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-006.pdf Ted.
-
FBI - Piecing Together Digital Evidence...
by Teddy Rogers- 2 replies
- 5.2k views
An article from the FBI... http://www.fbi.gov/news/stories/2013/january/piecing-together-digital-evidence/piecing-together-digital-evidence Ted.
-
Anti-Reverse Engineering (Assembly Obfuscation)
by Teddy Rogers- 3 replies
- 7.6k views
Anti-Reverse Engineering (Assembly Obfuscation) http://resources.infosecinstitute.com/anti-reverse-engineering-assembly-obfuscation/ Ted.
-
- 0 replies
- 5.9k views
A (relatively easy to understand) primer on elliptic curve cryptography... http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/ Ted.
-
DARPA Cyber Grand Challenge...
by Teddy Rogers- 0 replies
- 5.3k views
DARPA Cyber Grand Challenge Cyber Grand Challenge Rules... CyberGrandChallenge_Rules.pdf http://www.darpa.mil/cybergrandchallenge/ Ted.
-
- 3 replies
- 7.2k views
In this course we will explore what drives people to reverse engineer software and the methodology and tools used to do it. Topics include, but are not limited to: •Uses for RE •The tricks and pitfalls of analyzing compiled code •Identifying calling conventions •How to navigate x86 assembly using IDA Pro •Identifying Control Flows •Identifying the Win32 API •Using a debugger to aid RE •Dynamic Analysis tools and techniques for RE http://www.youtube.com/playlist?list=PL416CEDF4A931DB0DCourse Materials http://www.opensecuritytraining.info/IntroductionToReverseEngineering_files/reclass_public2.zippassword: reclass2011
-
GCHQ Recruiting... Can You Find It?
by Teddy Rogers- 0 replies
- 5k views
https://canyoufindit.co.uk/ Ted.
-
- 10 replies
- 12.1k views
All tutorilas about hacking wifi. From basic to advanced. It took only 2 hours, We can use wifi free everywhere, everywhen. Include Pack: Download Links: />http://hotfile.com/dl/66278663/3aa8cba/Wifi_Network_hacking_Ultimate_pack.part01.rar.html />http://hotfile.com/dl/66277126/f73cf00/Wifi_Network_hacking_Ultimate_pack.part02.rar.html />http://hotfile.com/dl/66276983/571869a/Wifi_Network_hacking_Ultimate_pack.part03.rar.html />http://hotfile.com/dl/66275823/1d0860e/Wifi_Network_hacking_Ultimate_pack.part04.rar.html />http://hotfile.com/dl/66275825/dfe15ca/Wifi_Network_hacking_Ultimate_pack.part05.rar.html />http://hotfile.com/dl/66281394/ca27675/Wifi_…
-
Reverse Engineering 101 NYU:Poly
by Soro- 4 replies
- 8k views
Understand, modify, and analyze compiled applications and systems to identify vulnerabilities Reverse Engineering 1 http://vimeo.com/30076325Slides: http://pentest.cryptocity.net/files/reversing/sotirov-re-fall2011.pdfBinary: http://pentest.cryptocity.net/files/reversing/homework-re-fall2011.zip Reverse Engineering 2 http://vimeo.com/30594548Slides http://pentest.cryptocity.net/files/reversing/2011/dynamic_reversing_2011.pdf
-
- 3 replies
- 5.6k views
DecryptoCat http://tobtu.com/decryptocat.php Ted.