Tag: Reverse-Engineering
-
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to …
-
Reverse Engineering BMCs and Other Firmware – Vladyslav Babkin – BTS #15
Vlad is part of the Eclypsium research team and has discovered several flaws in BMC ecosystems. He comes on the show to talk about his …
-
Indicators of compromise (IOCs): how we collect and use them
How exactly can indicators of compromise help information security specialists in their everyday work? To find the answer we asked three …
-
Researchers hack SpaceX Starlink satellite signal for GPS alternative
The University of Texas at Austin researchers hacked SpaceX’s Starlink Satellite’s Signal to use it as a GPS alternative without help …
-
A Long-Awaited IoT Reverse Engineering Tool Is Finally Here
Ten years after it was first unveiled, the powerful firmware analysis platform Ofrak is now available to …
-
Extracting type information from Go binaries
Go programs may contain hundreds of calls, it is obviously impractical to manually look up each type using a hex editor. So, there is the …
-
Accellion Attack Involved Extensive Reverse Engineering
Using a nearly 20-year-old file-transfer product: What could go …
-
Bypassing MassLogger Anti-Analysis — a Man-in-the-Middle Approach
The FireEye Front Line Applied Research & Expertise (FLARE) Team attempts to always stay on top of the most current and emerging threats. …
-
Announcing the Seventh Annual Flare-On Challenge
The FireEye Labs Advanced Reverse Engineering (FLARE) team is honored to announce that the popular Flare-On challenge will return for a …
-
PE Tree: Free open source tool for reverse-engineering PE files
PE Tree, a malware reverse-engineering, open source tool developed by the BlackBerry Research and Intelligence team, has been made …
-
FIDL: FLARE’s IDA Decompiler Library
IDA Pro and the Hex Rays decompiler are a core part of any toolkit for reverse engineering and vulnerability research. In a previous blog …
-
Binaries and Brews: Jailbreak Security Summit convenes hackers on NSA’s doorstep
Of the countless security conferences held across the globe, only one combines craft beer and malware analysis in the National Security …
●●●