Jatin shankar Srivastavajatin-devopw.hashnode.dev·Dec 13, 2024Stripping in Reverse Engineering: A Concept Overview with Code ExampleStripping is a technique used in reverse engineering to remove or obfuscate non-essential metadata from a compiled binary. This process reduces the file size and makes it more challenging for reverse engineers to understand or analyze the executable....10 likes·26 readsBinary Stripping
Najada Kambocodeunmasked.hashnode.dev·Dec 1, 2024Understanding JavaScript Deobfuscation: The Power of AST and BabelIn the realm of JavaScript reverse engineering, understanding Abstract Syntax Trees (ASTs) and Babel isn't just helpful—it's essential. Today, we'll dive deep into how these tools can transform seemingly unreadable code into clear, maintainable JavaS...107 readsUnmasking JavaScriptreverse engineering
danqing liulzdq.hashnode.dev·Nov 24, 2024SECCON CTF 2024 Reaction writeupreverse engineering, 15 teams solved What is this program emulating? Given an executable and a fake flag. Reverse the binary The binary first open flag.txt. Then, it allocates 624 integers and init them using mt19937. The seed is the production of ea...reverse engineering
danqing liulzdq.hashnode.dev·Nov 22, 2024qwb2024 quals mips-binGiven two binaries emu and mips_bin. mips_bin is a MIPS binary, and emu is a qemu emulator. Using ghidra, we can decode mips_bin. To dynamically debug it, use a normal qemu-mips emulator would be better. mips_bin performs an annoying fork. To get rid...CTF
Abdurrahman RajabforfreeCodeCampfreecodecamp.org·Nov 13, 2024How to Reverse Engineer a Website – a Guide for DevelopersWhile using one of your favorite websites, you might have often thought, "What if this website had this particular functionality? That would be great!" If you have ever had such thoughts, this article is for you. In it, you'll learn how websites comm...reverse engineering
Matthias Hosteinsidesoftware.hashnode.dev·Nov 5, 2024Revisiting aluigi's bf2urlzWhilst playing around with my Battlefield 2 master server replacement I had the brilliant idea to run the application I wrote for players as admin. Immediately I received backlash from the community telling me about bf2urlz and how it would be even m...55 readsbattlefield2
Matthias Hosteinsidesoftware.hashnode.dev·Nov 4, 2024Battlefield 2 the RAM eaterAfter having spent some time with the Battlefield 2 client executable for my previous post, which you can find here, I got interested in what the server executable contains. Lucky for me the linux executable is compiled with DWARF Debug Symbols, so w...battlefield2
Matthias Hosteinsidesoftware.hashnode.dev·Nov 4, 2024Battlefield 2 and the mystery of +passwordI recently received a message from a member of the Battlefield 2 community asking if I could fix an issue the game had Fixing the server password flag would something I'd be interested in 😄 BF2 is super stupid in that regard. It has a flag to pass t...44 readsbattlefield2
Rafael Vasconcelosdevwonderings.hashnode.dev·Nov 2, 2024Reverse Engineering: A show-off word for what you are actually doingThis is a review of my previous experiences working with reverse engineering, and why it became something scary and complex at first to something fun. First of all, let’s clarify what reverse engineering means : The act of copying the prodcut of an...Programming Blogs
Alexander Trotsenkoatrotsenko.hashnode.dev·Oct 28, 2024Как исследовать exe-файлы с Cutter. Практика обратной разработкиВ этой небольшой статье мы рассмотрим простейший пример исследования exe-файла методом обратной разработки с помощью Cutter. Мы научимся искать в exe-файлах нужные данные и соответствующие им участки кода, а также попробуем выполнить инъекцию своих и...64 readsобратная разработка