Most Popular

1500 questions
8
votes
2 answers

OTOOL alternative for linux

I have a reverse engineering set up on a Mac machine. This set up does some reverse engineering on iOS applications(.ipa files). I'm migrating the setup from Mac to a linux machine. Currently on Mac, I'm using OTOOL on ipa binary files and using the…
Rohit saraf
  • 233
  • 1
  • 3
  • 6
8
votes
2 answers

Does a Motorola SREC file give me any additional information over a binary ROM image?

When working with embedded systems, it is often easiest to use a downloadable firmware file rather than recover the firmware from the device. Mostly these are ROM images in the form of a .bin file. Sometimes, they are Motorola SREC files (often…
Cybergibbons
  • 1,762
  • 2
  • 17
  • 26
8
votes
1 answer

No apparent effect after editing some JSON in the memory of a Flash process

I was trying to change the values of a Flash game which loads the SWF and some JSON over a HTTPS site. So changing the values of JSON was not possible using browser cache. I changed the values of that JSON by editing the memory of the Adobe Flash…
Novice User
  • 223
  • 1
  • 3
8
votes
2 answers

Base address of shared objects from ldd output

I'm on a Linux machine with ASLR disabled. Running ldd on a binary gives me the following result : linux-gate.so.1 => (0xb7fe1000) libc.so.6 => /lib/i386-linux-gnu/libc.so.6 (0xb7e5c000) /lib/ld-linux.so.2 (0xb7fe2000) Does this mean that…
user1743
8
votes
2 answers

Decompile Python for ELF Binaries

There are several solutions available to extract Pyc files from Windows binaries and then decompile them using uncompyle2 or uncompyle6. However, I have a Linux ELF 64-bit binary which was compiled using one of the Packagers used for Python (might…
Neon Flash
  • 765
  • 1
  • 14
  • 29
8
votes
1 answer

Radare2 Call $+5 and register-based cross-references not found

I have a library of ~65MB which uses this "technique" as a kind of PIC. First, it gets some kind of base address (it is always the same): 0x00708497 e800000000 call 0x70849c 0x0070849c 5b pop ebx 0x0070849d …
Fabian Mendez
  • 321
  • 1
  • 8
8
votes
2 answers

Find base address and memory size of program debugged in gdb

I want to find out the base address and the imagesize of the program being debugged in gdb. As in, where it got loaded in memory. For shared libraries I can do "info sharedlibrary" and I get very nice output like so: 0x00007ffff7dd5f10 …
bernd feinman
  • 463
  • 1
  • 3
  • 10
8
votes
3 answers

Extracted router file execution

I am trying to run an executable file that I dug out from an extracted file system of a DSL modem router. So first of all I needed to either have a MIPS Linux box or take the emulation path. After some research and effort I got QEMU running a Debian…
Cyrax
  • 81
  • 2
8
votes
2 answers

FEEDFACE in OSX malware

I was reverse engineering a piece of code in "Crisis" for fun and I encountered the following :- __INIT_STUB_hidden:00004B8F mov eax, 8FE00000h __INIT_STUB_hidden:00004B94 __INIT_STUB_hidden:00004B94 loc_4B94: …
user1743
8
votes
0 answers

How do I reverse this firmware? 8-bit handheld console

I recently bought this chinese console that supposedly has 328 8-bit games. I want to understand the code and how it works to hack it and maybe load other ROMs. It has a chip covered in black epoxy resin that may be the microcontroller, and right…
8
votes
1 answer

What is fault-injection reverse engineering? What are the techniques involved?

Trying to extract data from the hardware is often quite difficult (especially when dealing with smartcards). Fault-injection attacks allow to guess cryptographic keys based on the propagation of errors through the encryption/decryption algorithm. I…
perror
  • 19,083
  • 29
  • 87
  • 150
8
votes
0 answers

Analyzing a Revit project file

I've been messing around with Revit and trying to understand the internal data structures for its file format. I'm not particularly experienced with this type of work and the processes around reverse engineering something. I figured I would post…
user25105
  • 81
  • 3
8
votes
1 answer

WinDbg fails to connect to IDA Pro debugger server

Environment: Host: Win7 SP1 x64: VMWare Workstation 9.02, VirtualKD, IDA Pro 6.4.13 (x64) and WinDbg Guest: Win7 SP1 x64 I have VirtualKD setup correctly in my guest and host. I say this because attaching WinDbg to the guest VM through VirtualKD…
8
votes
3 answers

Ripping/pasting code into an executable using Olly

I'm working with some x86 assembly code and I need to rip from one executable and paste that code into another. Originally, I had an executable that was meant to accept two command line parameters and run a handwritten function on them. However, I…
Fewmitz
  • 1,022
  • 5
  • 16
8
votes
1 answer

How to detect internal and shared libraries used in an executable file?

Problem: We want to be able to tell with some certainty that specific versions of internal libraries are being used by a program. For example, if a software uses old, deprecated libraries internally. Also, we would like to be able to tell what…
learnerX
  • 233
  • 3
  • 9