Rafael Vasconcelosdevwonderings.hashnode.dev·7 hours agoReverse Engineering: A show-off word for what you are actually doingThis is a review of my previous experiences working with reverse engineering, and why it became something scary and complex at first to something fun. First of all, let’s clarify what reverse engineering means : The act of copying the prodcut of an...DiscussProgramming Blogs
Alexander Trotsenkoatrotsenko.hashnode.dev·Oct 28, 2024Как исследовать exe-файлы с Cutter. Практика обратной разработкиВ этой небольшой статье мы рассмотрим простейший пример исследования exe-файла методом обратной разработки с помощью Cutter. Мы научимся искать в exe-файлах нужные данные и соответствующие им участки кода, а также попробуем выполнить инъекцию своих и...Discussобратная разработка
Bonsembiantebonsembiante.hashnode.dev·Oct 16, 2024Reverse engineering a dead MOTU audio interface to detect its failurehttps://www.youtube.com/watch?v=TRn4vVytfE4 A few months ago, I bought a used MOTU Ultralite AVB audio interface for only $100, a fraction of its original price. It was listed as "for parts" due to a malfunction, but I decided to take it and see if...Discuss·1.4K readsmotu
Juste R. Bocovojuste.bocovo.me·Sep 21, 2024How Vite helped me on my React source code exploration adventure.Diving into the depths of React.js source code or embarking on a journey of reverse engineering can be an exhilarating endeavor. To complete your journey, you'll need a small React application to act as your compass. So, how can you preview this smal...DiscussReact
Victor Uzoagbavictoru.hashnode.dev·Sep 9, 2024How to Reverse Engineer Mobile Applications for Security AnalysisReverse engineering of mobile applications is one of the key practices that help in understanding how an app works internally, find bugs, or assess security risks. As attackers are targeting more and more mobile devices in today's environment, it's t...DiscussMobile ecosystem
Joshua Colecolej.net·Sep 8, 2024How to Reverse Engineer Stripped Binaries Easily Using GDBDuring in the process of reverse engineering binaries, a common problem arises. How do I reverse engineer stripped binaries? There are no symbols to break on, offsets change, scripts don't work, and you ask yourself why am I doing this? Luckily there...Discuss·38 readsgdb
Neverquestblog.neverquest.green·Sep 3, 2024How to cheat in your exercises or Why you should encrypt your stuffHello guys, Since i was bored by my networking exams, i thought "what if i could cheat a little bit" let's see what i did Getting started The first step is to acquire a cisco packet tracer exercise, and understand how packet tracer understands the fi...Discussreverse engineering
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Aug 5, 2024[SEC Playground: Half Year CTF 2024] - LoaderIntroduction to the Challenge The challenge was a zip file containing a testdll.exe binary and loader.dll. When executed, it ask for the key. And showed this message after incorrect key input. Can you unpack this?. Format: re{flag} Password for unz...Discuss·44 readsSEC Playground: Half Year CTF 2024x64dbg
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 31, 2024[SEC Playground: Half Year CTF 2024] - CrackmeIntroduction to the Challenge The challenge was a zip file containing a crackme.exe binary. When executed, it showed this message. Do something with the program and the flag will show. Format: re{flag} Password for unzip: secplayground Anti-Debuggi...Discuss·42 readsSEC Playground: Half Year CTF 2024ILSpy
Ngô Thành VănforBlueCyber's blogbluecyber.hashnode.dev·Jul 31, 2024DEADSEC CTF 2024 : JavaCPScriptThis challenge provides us with 4 files In package.json file, it shows us the way to run the program Using the command in release, we can try to run and see what the program does It run for a while and tell us our flag is wrong, but we didn't prov...Discuss·35 readsreverse engineering