From Collaborative RCE Knowledge Library

Jump to: navigation, search

Reversing Technique Articles


Item name: x86 Disassembly Using C and Assembly Language
Rating: 2.0 (1 vote)
Author: Wikimedia foundation                        
Home URL: http://www.wikibooks.org/
Last updated: January 14, 2008
Version (if appl.):
Direct D/L link: Locally archived copy
Description: About
This book is about the disassembly of x86 machine code into human-readable assembly, and the decompilation
of x86 assembly code into human-readable C or C++ source code. Some topics covered will be common to all
computer architectures, not just x86-compatible machines.

Coverage
This book is going to look in-depth at the disassembly and decompilation of x86 machine code and assembly
code. We are going to look at the way programs are made using assemblers and compilers, and examine the way
that assembly code is made from C or C++ source code. Using this knowledge, we will try to reverse the
process. By examining common structures, such as data and control structures, we can find patterns that enable
us to disassemble and decompile programs quickly.
Also listed in: Generic Reversing Technique Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: Android Reverse Engineering - A Kick Start
Rating: 0.0 (0 votes)
Author: Dhanesh                        
Home URL: http://securityxploded.com/android_reversing.php
Last updated: November 14, 2010
Version (if appl.):
Direct D/L link: N/A
Description: The title pretty much says it all, get started with Android reversing!

Highlights of the Article:
* Show basic reversing of Andriod with simple crackme example
* Explains about the tools required for Andriod reversing and using them in right sequence.
* Describes in detail dissecting the Andriod code package to reveal the secrets.
Also listed in: Android Reversing Technique Articles, Android Reversing Technique Tutorials
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: firmware reversing : Netgear DG834PN
Rating: 0.0 (0 votes)
Author: Nicolas Krassas                        
Home URL: http://0entropy.blogspot.com
Last updated: August 17, 2011
Version (if appl.):
Direct D/L link: http://0entropy.blogspot.com/2011/08/firmware-reversing-netgear-dg834pn.html
Description: This short blogpost describes a technique used to identify the structure of a firmware image (an aDSL router in this case) and how to extract and mount its filesystem.
Also listed in: Linux Reversing Technique Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: PDF - Vulnerabilities, Exploits and Malwares
Rating: 0.0 (0 votes)
Author: Dhanesh                        
Home URL: http://securityxploded.com/pdf_vuln_exploits.php
Last updated: November 24, 2010
Version (if appl.):
Direct D/L link: Locally archived copy
Description: In this startup tutorial, Dhanesh explains how to use basic PDF analysis tools such as PDFAnalyzer in dissecting the exploit code from malicious PDF files in simple steps with illustrative screenshots.

Highlights of the Article:

* Throws light on usage of PDF analysis tools such as PDFAnalyzer
* Demonstrates malware analysis of real PDF samples
* Describes in detail dissecting of the exploit code from PDF structures.
Also listed in: Generic Reversing Technique Articles, Generic Reversing Technique Tutorials, Generic Tool Articles, Generic Tool Tutorials
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)



Item name: Subverting Windows7 x64 kernel with DMA attacks
Rating: 0.0 (0 votes)
Author: Christophe Devine, Damien Aumaitre                        
Home URL: https://bob.cat/
Last updated: July 4, 2010
Version (if appl.):
Direct D/L link: http://conference.hitb.org/hitbsecconf2010ams/materials/D2T2%20-%20Devine%20&%20Aumaitre%20-%20Subverting%20Windows%207%20x64%20Kernel%20with%20DMA%20Attacks.pdf
Description: This presentation will focus on concrete examples of compromising the Windows 7 x64 operating system, in effect bypassing two major security mecanisms: code signing and integrity verification (PatchGuard).

First, we’ll explain the internal structures of the operating system, and how they differ from previous versions. Then we describe how to alter these structures in order to gain control over the execution flow. The implementation of this attack is then presented, using an embedded soft-core MIPS CPU implemented on an FPGA PCMCIA/CardBus card.

Finally, we will conclude on the importance of new protection features included in recent CPUs, in particular the IOMMU and TXT.
Also listed in: Windows Internals Articles, Windows Reversing Technique Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)




RSS feed Feed containing all updates and additions for this category.

RSS feed Feed containing all updates and additions for this category, including sub-categories.




No items can be added directly to this category, please rather select one of its sub-categories above to submit an item!

Views