Questions tagged [reverse-engineering]

Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure, function and operation.

235 questions
14
votes
2 answers

Viewing the stack

I recently started learning about buffer overflows and how they work. Someone shared a binary to practice on (in a vm, don't worry). I've been feeding strings to the socket that the binary opens, and I noticed that at a certain length, the string…
13
votes
4 answers

Preventing reverse-engineering of client application

I have a web service which is used by a Flash client. Both the service and the Flash client is produced by me (read: my company). The Flash client communicates with the server over HTTPS. One of the issues we have seen lately is that people…
13
votes
2 answers

How would I go about rebuilding the IAT of a packed executable?

When executables are packed with a tool such as UPX, the real code and data sections are encrypted or obfuscated, then loaded into memory using an injected decrypter stub. This makes static analysis impossible. In order to circumvent this, I would…
Polynomial
  • 132,208
  • 43
  • 298
  • 379
13
votes
2 answers

Malware sandbox detection

I started some reverse engineering exercises using Ollydbg, IDA Pro and other tools like Sysinternals suite, etc. Some of these exercises are about malware. I downloaded some different malware from the awesome github repository called The Zoo. I…
OscarAkaElvis
  • 5,185
  • 3
  • 17
  • 48
11
votes
4 answers

How can I audit which type of Block Mode encryption is being used when no source code is available?

Given that there are clear advantages to using some block modes of encryption over another, and I would like to ensure that all software used in the enterprise uses a certain "level" of security I'd like to issue a statement of assurance to my…
11
votes
3 answers

Reverse engineering and Java

Is java class file or jar file is easy to reverse engineer? Because java generates a class file after compilation and not exe files. Is jar and class files are easy to decompile compare to c# and C++? If it is easy, then how can we protect java code…
sujeesh
  • 464
  • 2
  • 4
  • 10
11
votes
1 answer

Does analysing Malicious code in gdb pose a security risk?

I have encountered a Malicious Shell-Code & i have ported the shellcode into a compatible C Code which can run the shellcode, i compiled it using gcc -fno-stack-protector -z execstack shellcode.c -o code which gives output ELF file code, i am…
10
votes
1 answer

What role does cryptography play in anti-piracy?

As a follow-up to Cipher for Product Registration, are there secure yet usable cryptographic standards/protocols for protecting software and data used by software? I'm interested in hardware and software techniques for: Software…
mikeazo
  • 2,827
  • 12
  • 29
10
votes
3 answers

Where is the PE loader in Windows?

I have read that the PE loader is responsible for loading executable images from disk. When and where is the control flow exactly transferred to the loader? The PE format is well documented but there seems to be a little info regarding the…
viv
  • 637
  • 1
  • 7
  • 13
10
votes
5 answers

Does GHIDRA have a debugger?

Does GHIDRA have a debugger attached for dynamic analysis of application?
pentesterxvi
  • 101
  • 1
  • 1
  • 4
10
votes
1 answer

How to legally blog about Windows internals

In the field of malware analysis and reverse engineering, many job postings call for familiarity with the PE file format, Windows internals, etc. However, Microsoft presumably doesn't want people reversing DLLs and other closed-source binaries. As…
Vale132
  • 305
  • 1
  • 5
10
votes
4 answers

How to harden an iPhone/Android app so it's tough to reverse-engineer it?

These are the following objectives I have in mind: Make the app hard to crack, as the binary will hold some secret tokens. If it still can be cracked, is there any way the app can tell someone or its own self that it has been cracked (like checking…
kumar
  • 211
  • 3
  • 11
9
votes
3 answers

Vuln research: reverse engineering, debugging or fuzzing?

I wonder how hackers find vulnerabilities. If they use fuzzing, security engineers do it, and it's probably that security engineers (that work in a firm) have more resources than a group of hackers. Reverse-engineering takes a lot of time, and I…
jaja
  • 91
  • 1
  • 2
9
votes
1 answer

Any MITM tool for forcing weak SSL cipher suite?

Let's say I'm trying to reverse engineering communctions between an Android app and a web server uing HTTPS. At beginning, I tried to do MITM using webmitm and a fake cert. But the app failed to start because the fake cert used by webmitm is not…
user15580
  • 767
  • 3
  • 11
  • 15
9
votes
2 answers

Are there any dangers in exposing git sha1 commit hashes?

For a non-public repository, are there any potential security concerns in sharing git commit hashes? For example, when I post a git-related stackoverflow question that involves git commits from private repos, I will change the hashes slightly out of…
Andy Ray
  • 1,098
  • 1
  • 8
  • 12
1
2
3
15 16