Most Popular
1500 questions
8
votes
2 answers
OTOOL alternative for linux
I have a reverse engineering set up on a Mac machine. This set up does some reverse engineering on iOS applications(.ipa files). I'm migrating the setup from Mac to a linux machine.
Currently on Mac, I'm using OTOOL on ipa binary files and using the…
Rohit saraf
- 233
- 1
- 3
- 6
8
votes
2 answers
Does a Motorola SREC file give me any additional information over a binary ROM image?
When working with embedded systems, it is often easiest to use a downloadable firmware file rather than recover the firmware from the device.
Mostly these are ROM images in the form of a .bin file. Sometimes, they are Motorola SREC files (often…
Cybergibbons
- 1,762
- 2
- 17
- 26
8
votes
1 answer
No apparent effect after editing some JSON in the memory of a Flash process
I was trying to change the values of a Flash game which loads the SWF and some JSON over a HTTPS site. So changing the values of JSON was not possible using browser cache.
I changed the values of that JSON by editing the memory of the Adobe Flash…
Novice User
- 223
- 1
- 3
8
votes
2 answers
Base address of shared objects from ldd output
I'm on a Linux machine with ASLR disabled. Running ldd on a binary gives me the following result :
linux-gate.so.1 => (0xb7fe1000)
libc.so.6 => /lib/i386-linux-gnu/libc.so.6 (0xb7e5c000)
/lib/ld-linux.so.2 (0xb7fe2000)
Does this mean that…
user1743
8
votes
2 answers
Decompile Python for ELF Binaries
There are several solutions available to extract Pyc files from Windows binaries and then decompile them using uncompyle2 or uncompyle6.
However, I have a Linux ELF 64-bit binary which was compiled using one of the Packagers used for Python (might…
Neon Flash
- 765
- 1
- 14
- 29
8
votes
1 answer
Radare2 Call $+5 and register-based cross-references not found
I have a library of ~65MB which uses this "technique" as a kind of PIC.
First, it gets some kind of base address (it is always the same):
0x00708497 e800000000 call 0x70849c
0x0070849c 5b pop ebx
0x0070849d …
Fabian Mendez
- 321
- 1
- 8
8
votes
2 answers
Find base address and memory size of program debugged in gdb
I want to find out the base address and the imagesize of the program being debugged in gdb. As in, where it got loaded in memory. For shared libraries I can do "info sharedlibrary" and I get very nice output like so:
0x00007ffff7dd5f10 …
bernd feinman
- 463
- 1
- 3
- 10
8
votes
3 answers
Extracted router file execution
I am trying to run an executable file that I dug out from an extracted file system of a DSL modem router. So first of all I needed to either have a MIPS Linux box or take the emulation path. After some research and effort I got QEMU running a Debian…
Cyrax
- 81
- 2
8
votes
2 answers
FEEDFACE in OSX malware
I was reverse engineering a piece of code in "Crisis" for fun and I encountered the following :-
__INIT_STUB_hidden:00004B8F mov eax, 8FE00000h
__INIT_STUB_hidden:00004B94
__INIT_STUB_hidden:00004B94 loc_4B94: …
user1743
8
votes
0 answers
How do I reverse this firmware? 8-bit handheld console
I recently bought this chinese console that supposedly has 328 8-bit games. I want to understand the code and how it works to hack it and maybe load other ROMs. It has a chip covered in black epoxy resin that may be the microcontroller, and right…
Lorenzo Ivan
- 81
- 1
8
votes
1 answer
What is fault-injection reverse engineering? What are the techniques involved?
Trying to extract data from the hardware is often quite difficult (especially when dealing with smartcards). Fault-injection attacks allow to guess cryptographic keys based on the propagation of errors through the encryption/decryption algorithm. I…
perror
- 19,083
- 29
- 87
- 150
8
votes
0 answers
Analyzing a Revit project file
I've been messing around with Revit and trying to understand the internal data structures for its file format. I'm not particularly experienced with this type of work and the processes around reverse engineering something. I figured I would post…
user25105
- 81
- 3
8
votes
1 answer
WinDbg fails to connect to IDA Pro debugger server
Environment:
Host: Win7 SP1 x64: VMWare Workstation 9.02, VirtualKD, IDA Pro 6.4.13 (x64) and WinDbg
Guest: Win7 SP1 x64
I have VirtualKD setup correctly in my guest and host.
I say this because attaching WinDbg to the guest VM through VirtualKD…
Lelouch Lamperouge
- 323
- 2
- 9
8
votes
3 answers
Ripping/pasting code into an executable using Olly
I'm working with some x86 assembly code and I need to rip from one executable and paste that code into another.
Originally, I had an executable that was meant to accept two command line parameters and run a handwritten function on them. However, I…
Fewmitz
- 1,022
- 5
- 16
8
votes
1 answer
How to detect internal and shared libraries used in an executable file?
Problem: We want to be able to tell with some certainty that specific versions of internal libraries are being used by a program. For example, if a software uses old, deprecated libraries internally. Also, we would like to be able to tell what…
learnerX
- 233
- 3
- 9