Reason 7 Keygen Hax0r T3am Rar File

Posted on -
Permalink
  1. Reason 7 Keygen Hax0r T3am Rar Files

Join GitHub today

To any server admin out there. The OGC v5.0 cheat still works, even on the most up to date punkbuster/paladin server. I have tested 10 servers that say they are running the best anti-cheats. Tapete Records presents a reissue of Roger Nichols & The Small Circle Of Friends, a 1968 album by Roger Nichols. Nichols wrote some of the biggest hits of the 20th century and his songs were recorded by such illustrious names as Frank Sinatra, The Carpenters, The Monkees, and many more.

GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.

Fixfoto Fix container event listeners - adding and removing.

ReasonSign upKeygen
Find file Copy path

Reason 7 Keygen Hax0r T3am Rar Files

Cannot retrieve contributors at this time
created_utcscoredomainidtitleauthorupsdownsnum_commentspermalinkselftextlink_flair_textover_18thumbnailsubreddit_ideditedlink_flair_css_classauthor_flair_css_classis_selfnameurldistinguished
1369084070.0191self.ReverseEngineering1epw2mI dumped the ROM of a Tamagotchi!natashenka_2202929http://www.reddit.com/r/ReverseEngineering/comments/1epw2m/i_dumped_the_rom_of_a_tamagotchi/Details of my Tamagotchi code dump here: http://www.kwartzlab.ca/2013/05/first-glimpse-soul-tamagotchi/Also, here's all the images inside a Tama-Go (for your daily dose of RE-related cute): https://github.com/natashenka/Tamagotchi-Hack/tree/master/codedump/imagesFalset5_2qmd0FalseTruet3_1epw2mhttp://www.reddit.com/r/ReverseEngineering/comments/1epw2m/i_dumped_the_rom_of_a_tamagotchi/
1349116716.0168i.imgur.com10rtxrHarris does not want you RE'ing their bgan terminal firmware.. 1892113http://www.reddit.com/r/ReverseEngineering/comments/10rtxr/harris_does_not_want_you_reing_their_bgan/Falset5_2qmd0FalseFalset3_10rtxrhttp://i.imgur.com/mQKXs.png
1335135352.0129byuu.orgsn8snSNES Coprocessors — The Future Has Arrivedethicszen146177http://www.reddit.com/r/ReverseEngineering/comments/sn8sn/snes_coprocessors_the_future_has_arrived/Falset5_2qmd0FalseFalset3_sn8snhttp://byuu.org/articles/emulation/snes-coprocessors
1362990725.0122nostarch.com1a2mioNo Starch/Andrew (bunnie) Huang Releases 'Hacking the Xbox - An Introduction to Reverse Engineering' for free in honor of Aaron Swartz.sanitybit1411910http://www.reddit.com/r/ReverseEngineering/comments/1a2mio/no_starchandrew_bunnie_huang_releases_hacking_the/Falset5_2qmd0FalseFalset3_1a2miohttp://nostarch.com/xboxfree
1363561063.0114github.com1ahnenRE for Beginnersnullandnull128149http://www.reddit.com/r/ReverseEngineering/comments/1ahnen/re_for_beginners/Falset5_2qmd0FalseFalset3_1ahnenhttps://github.com/dennis714/RE-for-beginners
1363677072.0110eevblog.com1akxdoHacking NVidia Cards into their Professional Counterpartsrolfr1251516http://www.reddit.com/r/ReverseEngineering/comments/1akxdo/hacking_nvidia_cards_into_their_professional/Falset5_2qmd0FalseFalset3_1akxdohttp://www.eevblog.com/forum/projects/hacking-nvidia-cards-into-their-professional-counterparts/
1375467181.0105spritesmods.com1jktwkSprite_tm does some incredible work on a hard drive controllerGrazfather120154http://www.reddit.com/r/ReverseEngineering/comments/1jktwk/sprite_tm_does_some_incredible_work_on_a_hard/Falset5_2qmd0FalseFalset3_1jktwkhttp://spritesmods.com/?art=hddhack
1352605184.0100opensecuritytraining.info12ztggIntroductory Intel x86: An incredibly thorough and well explained introduction to Reverse Engineering and x86 assembly - A full two day course taught by Xeno KovahHockeyInJune127272http://www.reddit.com/r/ReverseEngineering/comments/12ztgg/introductory_intel_x86_an_incredibly_thorough_and/Falset5_2qmd0FalseFalset3_12ztgghttp://opensecuritytraining.info/IntroX86.html
1331027886.095thread.gmane.orgqjzkfAMD CPU bug causing stack pointer corruptionwtbw10056http://www.reddit.com/r/ReverseEngineering/comments/qjzkf/amd_cpu_bug_causing_stack_pointer_corruption/Falset5_2qmd0FalseFalset3_qjzkfhttp://thread.gmane.org/gmane.os.dragonfly-bsd.kernel/14471
1315340391.090blog.archive.orgk6rcbA 1970s Cray-1 hard drive has been imagedigor_sk9999http://www.reddit.com/r/ReverseEngineering/comments/k6rcb/a_1970s_cray1_hard_drive_has_been_imaged/Falset5_2qmd0FalseFalset3_k6rcbhttp://blog.archive.org/2011/09/03/hard-drive-archaeology-and-hackerspaces/
1376259511.089haxit.blogspot.com.es1k62b4Hax it!: Hacking Transcend WiFi SD Cardssircmpwn9566http://www.reddit.com/r/ReverseEngineering/comments/1k62b4/hax_it_hacking_transcend_wifi_sd_cards/Falset5_2qmd0FalseFalset3_1k62b4http://haxit.blogspot.com.es/2013/08/hacking-transcend-wifi-sd-cards.html
1375663886.086self.ReverseEngineering1jpln2Has anyone else taken a look at the shellcode that is driving the newest TOR/Firefox 17 exploit?k0ss_sec981232http://www.reddit.com/r/ReverseEngineering/comments/1jpln2/has_anyone_else_taken_a_look_at_the_shellcode/I was surprised to see few people doing much research on this. After looking at the [javascript file](http://pastebin.mozilla.org/2777139) and some traffic files that people have uploaded as they went to the backdoored onion site (such as [this](http://jsunpack.jeek.org/dec/go?report=fcb1f83ffd0f27bd9db52459f1a445f4688d15c6) and [this](http://jsunpack.jeek.org/dec/go?report=d68f00b4a5a4a21c6caf9c88b231a195a24204e0)), I quickly threw that into IDA to get a basic idea of what it is doing. ~~I've pasted it [here](http://pastebin.com/BNqMk5qy).~~ * /u/moyix [has posted a better annotated IDA output file that he found](http://pastebin.com/fjkEnfgD). Functions used by shellcode (so far in the analysis) include >Kernel32.LoadLibraryA, ws2_32.WSAStartup, ws2_32.WSASocketA, ws2_32.gethostname, ws2_32.gethostbyname, IPHLPAPI.SendARP, ws2_32.send, ws2_32.closesocket* /u/Borgbox has posted the Mozilla [bug report](https://bugzilla.mozilla.org/show_bug.cgi?id=901365) for this vulnerability. So far it looks like it was targeted at Windows but can possibly affect Linux hosts as well.EDIT: So far it looks like most basic shellcode, just grabbing the PE header (fs:[30]) and probably also finding locations of dependencies (I see a hashing function for that)EDIT: See [moyix's comment](http://www.reddit.com/r/ReverseEngineering/comments/1jpln2/has_anyone_else_taken_a_look_at_the_shellcode/cbh1qpe) for a run-down of what the shellcode does.Falset5_2qmd01375703445.0Truet3_1jpln2http://www.reddit.com/r/ReverseEngineering/comments/1jpln2/has_anyone_else_taken_a_look_at_the_shellcode/
1328706074.088self.ReverseEngineeringpg6l2crackmes.de backpri0r_z1051713http://www.reddit.com/r/ReverseEngineering/comments/pg6l2/crackmesde_back/http://crackmes.de/Even though I am new to the scene and having never used the site before, I have been waiting for the return of the site for some time now. It is hard to find reversing challenges at my level of ability, but not only is crackmes.de archive huge, but it is well ordered in level of difficulty, platform etc. Perfect.Time to dive in.Falset5_2qmd0TrueTruet3_pg6l2http://www.reddit.com/r/ReverseEngineering/comments/pg6l2/crackmesde_back/
1318102962.085ccc.del5c9jGerman hackers reversed the 'lawful interception' malware of the german police forcescetchmoh9163http://www.reddit.com/r/ReverseEngineering/comments/l5c9j/german_hackers_reversed_the_lawful_interception/Falset5_2qmd0FalseFalset3_l5c9jhttp://ccc.de/en/updates/2011/staatstrojaner
1375081245.086tasvideos.org1j9htlArbitrary code execution via standard controls in Yoshi Islandsimpleuser9594http://www.reddit.com/r/ReverseEngineering/comments/1j9htl/arbitrary_code_execution_via_standard_controls_in/Falset5_2qmd0FalseFalset3_1j9htlhttp://tasvideos.org/4025S.html
1294797865.083geohot.comf0m1jSony sues everybody involved with the recent PS3 compromises [PDF]rolfr941158http://www.reddit.com/r/ReverseEngineering/comments/f0m1j/sony_sues_everybody_involved_with_the_recent_ps3/Falset5_2qmd0FalseFalset3_f0m1jhttp://geohot.com/Motion%20For%20TRO.pdf
1305910833.086self.ReverseEngineeringhg0fxA modest proposal (Absolutely no babies involved)genesai961020http://www.reddit.com/r/ReverseEngineering/comments/hg0fx/a_modest_proposal_absolutely_no_babies_involved/I have a small suggestion. Why not put some beginners resources in the sidebar? I know that there are many people who would really like to be able to do some reverse engineering (personally I'd like to be able to write a port of DD-WRT which works on Ubicom processors).If you have any articles/web-pages that could explain the basics, like what tools to use, methods etc. please do post them. Edit: I'll start making a list of things I find and if anyone would like to add.[What is reverse engineering](http://en.wikipedia.org/wiki/Reverse_engineering) - Wikipedia article[Introduction to Reverse Engineering Software](http://www.acm.uiuc.edu/sigmil/RevEng/) - An introductory online book on reverse engineering which is very helpful according to [Accuria](http://www.reddit.com/user/Accuria) who PM:ed it to me.**Tools:**[The Collaborative RCE Tool Library](http://www.woodmann.com/collaborative/tools/index.php/Category:RCE_Tools)[Disassemblers](http://en.wikipedia.org/wiki/Disassembler)--------------- [IDA Pro](http://www.hex-rays.com/idapro/idadownfreeware.htm) - The Interactive Disassembler. It's used to reverse engineer executables and according to [wikipedia](http://en.wikipedia.org/wiki/Ida_pro) there is a plugin which can decompile c/c++ executables. This is the free version. I'm not really sure which features are missing or if they are important. Probably depends on what you want to do.- [SwfScan](http://tools.securitytube.net/index.php?title=SwfScan)- [Jad](http://www.varaneckas.com/jad) - Java decompiler- [JD-Gui](http://www.varaneckas.com/jad) - Java decompiler[Debuggers](http://en.wikipedia.org/wiki/Debugger)--------------- [Evans Debugger](http://tools.securitytube.net/index.php?title=Evans_Debugger)- [WinDbg](http://msdn.microsoft.com/en-us/windows/hardware/gg463009)- [OllyDbg](http://tools.securitytube.net/index.php?title=OllyDbg)- [W32Dasm](http://tools.securitytube.net/index.php?title=W32Dasm)- [GDB GNU Debugger](http://tools.securitytube.net/index.php?title=GDB_GNU_Debugger)Editors - Hex and PE editors--------------- [CFF Explorer](http://tools.securitytube.net/index.php?title=CFF_Explorer)- [Uncle Hextor Hex Editor](http://www.weirdkid.com/products/unclehextor/)- [Woodmans Reverse Engineering Tools](http://www.woodmann.com/crackz/Tools.htm) (Are they old? Feedback on these appreciated)**Programming Languages:**- [Assembly Language](http://en.wikipedia.org/wiki/Assembly_language) - A [low level language](http://en.wikipedia.org/wiki/Low-level_programming_language). Not really sure when it's appropriate to use but it's vital when you are reversing software. Unless you find a really good decompiler, which i doubt exists. Here is a [tutorial](http://www.securitytube.net/video/208). It's for hackers so how could it be bad ;p- [/r/programming’s faq](http://www.reddit.com/r/programming/faq)**Tutorials:**Videos--------------- [Reversing Binaries](http://www.securitytube.net/video/1842)- [Breaking Password Encryptions with IDA](http://www.securitytube.net/video/128)- [Breaking Password Encryptions using a hex editor](http://www.youtube.com/watch?v=XVJSVQrDOqQ&feature=related)- [Tiga’s IDA Tutorials](http://www.woodmann.com/TiGa/idaseries.html)- [Using IDA pro](http://www.youtube.com/watch?v=K08Zw_l4xSw)- [Olly DbgTutorial](https://sites.google.com/site/corkami/ollydbg-tracing)- [Reversing Q&A](http://www.youtube.com/watch?v=uq3HY-bx3Gg)Text & Interactive--------------- [Reversing for Newbies](http://tuts4you.com/download.php?list.17)- [+HCU: Academy of Reverse Engineering](http://www.woodmann.com/fravia/academy.htm)- [Using IDA](http://home.online.no/~reopsahl/files/gij!ida.txt)- [IDA user tut](http://www.scribd.com/doc/32327741/IDA-User-Tutorial)- [Newbies intro to reverse engineering](http://busydizzys.com/index.php/2011/01/22/a-simplified-intro-to-reverse-engineering-software-processes)**Books:****System specific**- [Sys internals](http://technet.microsoft.com/en-gb/sysinternals) - tools for windows- [Instruments](http://www.apple.com/macosx/developers/#instruments) - tools for OSX- [Dex2Jar](http://code.google.com/p/dex2jar/downloads/list) - Tool used to convert Android binaries to Jar so that you can decompile them.**Old Threads:**- [Another reverse engineering thread](http://www.reddit.com/r/ReverseEngineering/comments/fvl9m/where_do_i_start_learning_to_reverse_engineer/) For those wanting to delve into the more formal side of things [here](http://www.reddit.com/r/ReverseEngineering/comments/hg0fx/a_modest_proposal_absolutely_no_babies_involved/c1v5icw) is a post from rolfr containing books, lectures etc.Please help me out.by Genesai in collaboration with asmodeusFalset5_2qmd0TrueTruet3_hg0fxhttp://www.reddit.com/r/ReverseEngineering/comments/hg0fx/a_modest_proposal_absolutely_no_babies_involved/
1367764961.079windytan.blogspot.com1dqdppA determined 'hacker' decrypts RDS-TMCigor_sk99202http://www.reddit.com/r/ReverseEngineering/comments/1dqdpp/a_determined_hacker_decrypts_rdstmc/Falset5_2qmd0FalseFalset3_1dqdpphttp://windytan.blogspot.com/2013/05/a-determined-hacker-decrypts-rds-tmc.html
1361222898.081adamsblog.aperturelabs.com18rw3gA peek into the curious world of HDMI copy protectionsimpleuser96153http://www.reddit.com/r/ReverseEngineering/comments/18rw3g/a_peek_into_the_curious_world_of_hdmi_copy/Falset5_2qmd0FalseFalset3_18rw3ghttp://adamsblog.aperturelabs.com/2013/02/hdcp-is-dead-long-live-hdcp-peek-into.html
1329799447.087github.compyw0zI reversed engineered the protocol for a joystick and wrote a driver for it.amstan1021529http://www.reddit.com/r/ReverseEngineering/comments/pyw0z/i_reversed_engineered_the_protocol_for_a_joystick/Falset5_2qmd0FalseFalset3_pyw0zhttps://github.com/amstan/3dzonemaster
1302507048.080mafipulation.orggn8m4Apple Airport Private Key Extractedbigmac8997http://www.reddit.com/r/ReverseEngineering/comments/gn8m4/apple_airport_private_key_extracted/Falset5_2qmd0FalseFalset3_gn8m4http://www.mafipulation.org/blagoblig/2011/04/08#shairport
1278552636.080enrupt.comcn3uwSkype's Biggest Secret Revealedcloudburst95156http://www.reddit.com/r/ReverseEngineering/comments/cn3uw/skypes_biggest_secret_revealed/Falset5_2qmd0FalseFalset3_cn3uwhttp://www.enrupt.com/index.php/2010/07/07/skype-biggest-secret-revealed
1342319369.077code.google.comwkqyzWindows Executable Walkthrough Graphicekaj90134http://www.reddit.com/r/ReverseEngineering/comments/wkqyz/windows_executable_walkthrough_graphic/Falset5_2qmd0FalseFalset3_wkqyzhttp://code.google.com/p/corkami/wiki/PE101?show=content
1314755827.083opensecuritytraining.infojzppyGreat tutorials for beginner REverse Engineers. skibizkit9183http://www.reddit.com/r/ReverseEngineering/comments/jzppy/great_tutorials_for_beginner_reverse_engineers/Falset5_2qmd0FalseFalset3_jzppyhttp://opensecuritytraining.info/Training.html
1365633931.077cs.cmu.edu1c3gc5The First Level of Super Mario Bros. is Easy with Lexicographic Orderings and Time Travel [pdf]nullandnull891218http://www.reddit.com/r/ReverseEngineering/comments/1c3gc5/the_first_level_of_super_mario_bros_is_easy_with/Falset5_2qmd0FalseFalset3_1c3gc5https://www.cs.cmu.edu/~tom7/mario/mario.pdf
1344433645.078blog.praty.netxvpeaBuilding an MMORPG Bot from scratch - Part1 willsteel921429http://www.reddit.com/r/ReverseEngineering/comments/xvpea/building_an_mmorpg_bot_from_scratch_part1/Falset5_2qmd0FalseFalset3_xvpeahttp://blog.praty.net/?p=292
1336060918.075pe101.corkami.comt58vlPE 101 - a windows executable walkthroughsimpleuser871216http://www.reddit.com/r/ReverseEngineering/comments/t58vl/pe_101_a_windows_executable_walkthrough/Falset5_2qmd0FalseFalset3_t58vlhttp://pe101.corkami.com
1328571524.076self.ReverseEngineeringpdtw4Crackmes.de down for 8 Months, call to action?andrewl_931719http://www.reddit.com/r/ReverseEngineering/comments/pdtw4/crackmesde_down_for_8_months_call_to_action/I loved crackmes.de and spent a lot of time moderating, writing crackmes, and of course solving crackmes. Zero owned and paid to host the site, that can't be argued. But the site itself was all user donations. We crafted the crackmes. We polished the solutions. We moderated the queue.I feel bad his site is facing viruses or legal trouble or whatever. But its been 8 months, and I feel that holding the community in this stand-still is wrong. I've made numerous requests for a simple tarball of all the crackmes so that a proper mirror could be made until crackmes.de gets back up, but every reply amounts to an evasive 'no'.If you agree, please send a kind email to Zero (Dr. Thorsten Schneider) making your case. Maybe if he just knows that many are waiting, it will spur him to yield our material. If you see it differently, or there's a perspective I'm missing, then let me know; I'm open to opposing viewpoints here.Crackmes.de slogan was the 'Reversers' playground', but Zero has taken everyone's toys and gone home.(to avoid causing spam, please don't post any actual contact information - just use google)http://twitter.com/NLPLerncoachhttp://www.lerncoach-herford.de/http://twitter.com/binaryauditinghttp://www.binary-auditing.com/http://reverse-engineering.netetc..Falset5_2qmd0FalseTruet3_pdtw4http://www.reddit.com/r/ReverseEngineering/comments/pdtw4/crackmesde_down_for_8_months_call_to_action/
1343853184.073code.google.comxiwnca file that is a Windows Executable, a PDF document, a Java executable (or a Python script), and an HTML page.simpleuser851212http://www.reddit.com/r/ReverseEngineering/comments/xiwnc/a_file_that_is_a_windows_executable_a_pdf/Falset5_2qmd0FalseFalset3_xiwnchttp://code.google.com/p/corkami/downloads/detail?name=CorkaMIX.zip
1332164886.072securelist.comr3fh5The mystery of Duqu Framework solvedpwnwaffe871516http://www.reddit.com/r/ReverseEngineering/comments/r3fh5/the_mystery_of_duqu_framework_solved/Falset5_2qmd0FalseFalset3_r3fh5http://www.securelist.com/en/blog/677/The_mystery_of_Duqu_Framework_solved
1365370370.074neocomputer.org1bviqxFixing E.T. for the Atari 2600rolfr90165http://www.reddit.com/r/ReverseEngineering/comments/1bviqx/fixing_et_for_the_atari_2600/Falset5_2qmd0FalseFalset3_1bviqxhttp://www.neocomputer.org/projects/et/
1347035098.074blog.virustotal.comzifx6Google has acquired VirusTotalPilate86128http://www.reddit.com/r/ReverseEngineering/comments/zifx6/google_has_acquired_virustotal/Falset5_2qmd0FalseFalset3_zifx6http://blog.virustotal.com/2012/09/an-update-from-virustotal.html
1345115592.068blog.praty.netybcrkBuilding an MMORPG Bot from scratch - Part2defragger81136http://www.reddit.com/r/ReverseEngineering/comments/ybcrk/building_an_mmorpg_bot_from_scratch_part2/Falset5_2qmd0FalseFalset3_ybcrkhttp://blog.praty.net/?p=315
1343377869.072extremetech.comx8meuBlack Hat hacker gains access to 4 million hotel rooms with Arduino microcontrollersamcrem972511http://www.reddit.com/r/ReverseEngineering/comments/x8meu/black_hat_hacker_gains_access_to_4_million_hotel/Falset5_2qmd0FalseFalset3_x8meuhttp://www.extremetech.com/computing/133448-black-hat-hacker-gains-access-to-4-million-hotel-rooms-with-arduino-microcontroller
1333813084.069blog.lse.epita.frrxxjlStatic analysis of an unknown compression formatdelroth83143http://www.reddit.com/r/ReverseEngineering/comments/rxxjl/static_analysis_of_an_unknown_compression_format/Falset5_2qmd0FalseFalset3_rxxjlhttp://blog.lse.epita.fr/articles/8-static-analysis-of-an-unknown-compression-format.html
1241436683.071self.ReverseEngineering8ho6vThis morning +Fravia passed away.octalespresso811016http://www.reddit.com/r/ReverseEngineering/comments/8ho6v/this_morning_fravia_passed_away/Falset5_2qmd0FalseTruet3_8ho6vhttp://www.reddit.com/r/ReverseEngineering/comments/8ho6v/this_morning_fravia_passed_away/
1290476427.065kickstarter.comea9r2Some friends of mine are starting a project for an open USB analyzer. Support is welcome!godofpumpkins781310http://www.reddit.com/r/ReverseEngineering/comments/ea9r2/some_friends_of_mine_are_starting_a_project_for/Falset5_2qmd0FalseFalset3_ea9r2http://www.kickstarter.com/projects/bushing/openvizsla-open-source-usb-protocol-analyzer
1349377926.070secnews.pl10y8uoHakin9 mag want to sue polish blogger because he revealed their spamming business modelpaco_el_taco972719http://www.reddit.com/r/ReverseEngineering/comments/10y8uo/hakin9_mag_want_to_sue_polish_blogger_because_he/Falset5_2qmd0FalseFalset3_10y8uohttp://www.secnews.pl/en/2012/10/04/software-press-chce-mnie-pozwac/
1297068748.071krebsonsecurity.comfgra7HBGary pwneddimonio7765http://www.reddit.com/r/ReverseEngineering/comments/fgra7/hbgary_pwned/Falset5_2qmd0FalseFalset3_fgra7http://krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/
1360040427.068blog.accuvantlabs.com17x0ayEvasi0n Jailbreak's Userland Component Analysispolsab80124http://www.reddit.com/r/ReverseEngineering/comments/17x0ay/evasi0n_jailbreaks_userland_component_analysis/Falset5_2qmd0FalseFalset3_17x0ayhttp://blog.accuvantlabs.com/blog/bthomas/evasi0n-jailbreaks-userland-component
1348018371.068randomascii.wordpress.com1042nuWindows Slowdown, Investigated and Identifiedrolfr80125http://www.reddit.com/r/ReverseEngineering/comments/1042nu/windows_slowdown_investigated_and_identified/Falset5_2qmd0FalseFalset3_1042nuhttp://randomascii.wordpress.com/2012/09/04/windows-slowdown-investigated-and-identified/
1353873188.066opensecuritytraining.info13rsnlIntro ARM Assembly Class (w/ 2 days of videos)OpenSecurityTraining76100http://www.reddit.com/r/ReverseEngineering/comments/13rsnl/intro_arm_assembly_class_w_2_days_of_videos/Falset5_2qmd0FalseFalset3_13rsnlhttp://www.opensecuritytraining.info/ChangeBlog/Entries/2012/11/25_New_class_added__Introduction_to_ARM%2C_including_2_days_of_videos!.html
1289638472.065symantec.come5j55Stuxnet: A Breakthroughwtbw75109http://www.reddit.com/r/ReverseEngineering/comments/e5j55/stuxnet_a_breakthrough/Falset5_2qmd0FalseFalset3_e5j55http://www.symantec.com/connect/blogs/stuxnet-breakthrough
1369652674.065spectrumcoding.com1f4rjeSimple Buffer Overflow Tutorialfernol771231http://www.reddit.com/r/ReverseEngineering/comments/1f4rje/simple_buffer_overflow_tutorial/Falset5_2qmd0FalseFalset3_1f4rjehttp://www.spectrumcoding.com/p/Buffer_Overflows
1357885611.066hex-rays.com16d7ktIDA 6.4 releasedadvanced_reddit_user78129http://www.reddit.com/r/ReverseEngineering/comments/16d7kt/ida_64_released/Falset5_2qmd0FalseFalset3_16d7kthttp://www.hex-rays.com/products/ida/6.4/index.shtml
1307012723.064skype-open-source.blogspot.comhpu7ySkype protocol reverse engineered, source available for downloadBrovvnout6951http://www.reddit.com/r/ReverseEngineering/comments/hpu7y/skype_protocol_reverse_engineered_source/Falset5_2qmd0FalseFalset3_hpu7yhttp://skype-open-source.blogspot.com/2011/06/skype-protocol-reverse-engineered.html
1357557121.065community.rapid7.com1645mwSkynet, a Tor-powered botnet straight from Redditigor_sk84197http://www.reddit.com/r/ReverseEngineering/comments/1645mw/skynet_a_torpowered_botnet_straight_from_reddit/Falset5_2qmd0FalseFalset3_1645mwhttps://community.rapid7.com/community/infosec/blog/2012/12/06/skynet-a-tor-powered-botnet-straight-from-reddit
1353674715.062aurellem.org13nyjfProgramming Pokemon Yellow using the save corruption bug and in-game inventory listigor_sk89279http://www.reddit.com/r/ReverseEngineering/comments/13nyjf/programming_pokemon_yellow_using_the_save/Falset5_2qmd0FalseFalset3_13nyjfhttp://aurellem.org/vba-clojure/html/total-control.html
1264553264.063self.ReverseEngineeringaujxsgeohot reveals his ps3 exploitethicszen69612http://www.reddit.com/r/ReverseEngineering/comments/aujxs/geohot_reveals_his_ps3_exploit/ geohot: well actually it's pretty simple geohot: i allocate a piece of memory geohot: using map_htab and write_htab, you can figure out the real address of the memory geohot: which is a big win, and something the hv shouldn't allow geohot: i fill the htab with tons of entries pointing to that piece of memory geohot: and since i allocated it, i can map it read/write geohot: then, i deallocate the memory geohot: all those entries are set to invalid geohot: well while it's setting entries invalid, i glitch the memory control bus geohot: the cache writeback misses the memory :) geohot: and i have entries allowing r/w to a piece of memory the hypervisor thinks is deallocated geohot: then i create a virtual segment with the htab overlapping that piece of memory i have geohot: write an entry into the virtual segment htab allowing r/w to the main segment htab geohot: switch to virtual segment geohot: write to main segment htab a r/w mapping of itself geohot: switch back geohot: PWNED geohot: and would work if memory were encrypted or had ECC geohot: the way i actually glitch the memory bus is really funny geohot: i have a button on my FPGA board geohot: that pulses low for 40ns geohot: i set up the htab with the tons of entries geohot: and spam press the button geohot: right after i send the deallocate call Falset5_2qmd0FalseTruet3_aujxshttp://www.reddit.com/r/ReverseEngineering/comments/aujxs/geohot_reveals_his_ps3_exploit/
1321308520.062applidium.commc9g9Cracking Siritaocp78162http://www.reddit.com/r/ReverseEngineering/comments/mc9g9/cracking_siri/Falset5_2qmd0FalseFalset3_mc9g9http://applidium.com/en/news/cracking_siri/
1297851135.061arstechnica.comfmduxAnonymous speaks: the inside story of the HBGary hackrolfr6984http://www.reddit.com/r/ReverseEngineering/comments/fmdux/anonymous_speaks_the_inside_story_of_the_hbgary/Falset5_2qmd0FalseFalset3_fmduxhttp://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
1286026457.062hex-rays.comdlw33IDA Pro 6.0 Released - New QT based GUI = Native support for Linux & Mac!sanitybit68633http://www.reddit.com/r/ReverseEngineering/comments/dlw33/ida_pro_60_released_new_qt_based_gui_native/Falset5_2qmd0FalseFalset3_dlw33http://www.hex-rays.com/idapro/60/index.html
1365702533.062net-security.org1c5cbeHijacking airplanes with an Android phoneigor_sk81199http://www.reddit.com/r/ReverseEngineering/comments/1c5cbe/hijacking_airplanes_with_an_android_phone/Falset5_2qmd0FalseFalset3_1c5cbehttp://net-security.org/secworld.php?id=14733
1311423108.065digitizor.comixlx3All Apple Laptops Can Be Hacked Through The Battery5d41402abc4b2a76b97183189http://www.reddit.com/r/ReverseEngineering/comments/ixlx3/all_apple_laptops_can_be_hacked_through_the/Falset5_2qmd0FalseFalset3_ixlx3http://digitizor.com/2011/07/23/macbook-hacked-battery/
1369875579.058bitbucket.org1fb1toNew Open Source Java Decompilerigor_sk711325http://www.reddit.com/r/ReverseEngineering/comments/1fb1to/new_open_source_java_decompiler/Falset5_2qmd0FalseFalset3_1fb1tohttps://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler
1357176589.059eddiem.com15uzarFighting the Epson ink chip and winning!pointfree711210http://www.reddit.com/r/ReverseEngineering/comments/15uzar/fighting_the_epson_ink_chip_and_winning/Falset5_2qmd0FalseFalset3_15uzarhttp://www.eddiem.com/photo/CIS/inkchip/chip.html
1362678941.059gironsec.com19uud5reverse engineering a live botnetAv3ragej0e75169http://www.reddit.com/r/ReverseEngineering/comments/19uud5/reverse_engineering_a_live_botnet/Falset5_2qmd0FalseFalset3_19uud5http://www.gironsec.com/blog/2013/03/reversing-a-botnet/
1317927167.059hex-rays.coml39qbIDA 6.2 Releasedhellixor6784http://www.reddit.com/r/ReverseEngineering/comments/l39qb/ida_62_released/Falset5_2qmd0FalseFalset3_l39qbhttp://www.hex-rays.com/products/ida/6.2/index.shtml
1315031939.059code.google.comk3bl2x86 odditiessimpleuser6231http://www.reddit.com/r/ReverseEngineering/comments/k3bl2/x86_oddities/Falset5_2qmd0FalseFalset3_k3bl2http://code.google.com/p/corkami/wiki/x86oddities
1244545621.057vochinese.com8qzvsThe censorship software that Chinese gov. force to install on every PC. Anyone take a look at it to find some keywords list or 'harmful' URL list?691262http://www.reddit.com/r/ReverseEngineering/comments/8qzvs/the_censorship_software_that_chinese_gov_force_to/Falset5_2qmd0FalseFalset3_8qzvshttp://www.vochinese.com/download/LH-setup3.17.exe
1367247081.057tasvideos.org1dc93hExploiting Super Mario World (via 4 joypads)simpleuser64715http://www.reddit.com/r/ReverseEngineering/comments/1dc93h/exploiting_super_mario_world_via_4_joypads/Falset5_2qmd0FalseFalset3_1dc93hhttp://tasvideos.org/3957S.html
1361082300.057righto.com18oj87the 8085's undocumented flags, K and Vsimpleuser69120http://www.reddit.com/r/ReverseEngineering/comments/18oj87/the_8085s_undocumented_flags_k_and_v/Falset5_2qmd0FalseFalset3_18oj87http://www.righto.com/2013/02/looking-at-silicon-to-understanding.html
1359108713.057self.ReverseEngineering178zkkWhat is the state-of-the-art in cheat detection in commercial multiplayer games?fnordstar66961http://www.reddit.com/r/ReverseEngineering/comments/178zkk/what_is_the_stateoftheart_in_cheat_detection_in/I've been out of touch with the topic for a while and I'm trying to catch on with current techniques. I am currently using Intel PIN to redirect instruction flow in a game to my own functions and I was wondering what the risk of being detected would be when doing this to a, say, VAC3 enabled engine.For example, I read that VAC3 would be able to detect illegitimate DLLs even if they were unlinked from the module list. How does it do that? QueryVirtualMemory is an obvious method, but those results can be spoofed easily. Would it actually be feasible for the game to step through it's whole 32 bit address space and touching every 4kb page?Is anyone else using PIN for reverse engineering games? What are your experiences with that?Falset5_2qmd0FalseTruet3_178zkkhttp://www.reddit.com/r/ReverseEngineering/comments/178zkk/what_is_the_stateoftheart_in_cheat_detection_in/
1358286582.057onlinedisassembler.com16n5jhODA - Online Disassembler_rc6587http://www.reddit.com/r/ReverseEngineering/comments/16n5jh/oda_online_disassembler/Falset5_2qmd0FalseFalset3_16n5jhhttp://onlinedisassembler.com/odaweb/run_hex
1351019065.058devttys0.com11ylirRooting the NeoTV set top boxdevttys064615http://www.reddit.com/r/ReverseEngineering/comments/11ylir/rooting_the_neotv_set_top_box/Falset5_2qmd0FalseFalset3_11ylirhttp://www.devttys0.com/2012/10/jailbreaking-the-neotv/
1344604191.058blog.praty.netxzt77decrypting and analyzing proprietary protocolswillsteel6355http://www.reddit.com/r/ReverseEngineering/comments/xzt77/decrypting_and_analyzing_proprietary_protocols/Falset5_2qmd0FalseFalset3_xzt77http://blog.praty.net/?p=235
1286708436.060dogber1.blogspot.comdp9zlBIOS Password Backdoors in Laptops - Dogbert's Blog6005http://www.reddit.com/r/ReverseEngineering/comments/dp9zl/bios_password_backdoors_in_laptops_dogberts_blog/Falset5_2qmd0FalseFalset3_dp9zlhttp://dogber1.blogspot.com/2009/05/table-of-reverse-engineered-bios.html
1361544233.057area51.stackexchange.com190t2mThe proposed Reverse Engineering StackOverflow site has reached the commitment phaserolfr67103http://www.reddit.com/r/ReverseEngineering/comments/190t2m/the_proposed_reverse_engineering_stackoverflow/Falset5_2qmd0FalseFalset3_190t2mhttp://area51.stackexchange.com/proposals/49551/reverse-engineering?referrer=tMnjk2Xy4m_6biNthqvlIQ2??
1345628943.061nycresistor.comympkaGhosts in the ROMigor_sk71100http://www.reddit.com/r/ReverseEngineering/comments/ympka/ghosts_in_the_rom/Falset5_2qmd0FalseFalset3_ympkahttp://www.nycresistor.com/2012/08/21/ghosts-in-the-rom/
1372772584.056youtube.com1hhuz7DEFCON 19: The History and the Evolution of Computer Viruseskamicc67115http://www.reddit.com/r/ReverseEngineering/comments/1hhuz7/defcon_19_the_history_and_the_evolution_of/Falset5_2qmd0FalseFalset3_1hhuz7http://www.youtube.com/watch?v=s2g9lgYrYJM
1368108981.056bot-thoughts.com1e02hlWriting a Perl disassembler for the Motorola 6801 CPU to learn how a fuel injection computer workskasbah6480http://www.reddit.com/r/ReverseEngineering/comments/1e02hl/writing_a_perl_disassembler_for_the_motorola_6801/Falset5_2qmd0FalseFalset3_1e02hlhttp://www.bot-thoughts.com/2013/05/reverse-engineering-gm-ecms.html
1344533835.056twitch.tvxy6bwI'm a professional MMO bot maker, live streaming my protocol update process for users and explaining things as I go along. Feel free to watch, Reddit RE.NickCano711567http://www.reddit.com/r/ReverseEngineering/comments/xy6bw/im_a_professional_mmo_bot_maker_live_streaming_my/Falset5_2qmd0FalseFalset3_xy6bwhttp://www.twitch.tv/darkstar_xeno#
1370624451.057andrewkelley.me1fvenqStatically Recompiling NES Games into Native Executables with LLVM and Go1107d769121http://www.reddit.com/r/ReverseEngineering/comments/1fvenq/statically_recompiling_nes_games_into_native/Falset5_2qmd0FalseFalset3_1fvenqhttp://andrewkelley.me/post/jamulator.html
1352854299.055blogs.msdn.com135jtsRaymond patches Microsoft Money to make it run on Win8igor_sk68136http://www.reddit.com/r/ReverseEngineering/comments/135jts/raymond_patches_microsoft_money_to_make_it_run_on/Falset5_2qmd0FalseFalset3_135jtshttp://blogs.msdn.com/b/oldnewthing/archive/2012/11/13/10367904.aspx
1335081526.053self.ReverseEngineeringsmf4uReverser wanting to develop mathematicallyday6reak661328http://www.reddit.com/r/ReverseEngineering/comments/smf4u/reverser_wanting_to_develop_mathematically/I've been reversing for almost a decade now. My work is mostly security oriented with bug hunting and malware. Lately, I've been noticing that my development has been coming up against a mathematical wall. When going through academic papers and other sources where algorithms are described I sometimes have trouble bridging the gap from equation to implementation. It pisses me off when I cannot grasp something so I've decided to devote myself to mathematics.I am going to be teaching myself advanced math and would like recommendations on what to learn from people who are able to understand reversing and security from a mathematical standpoint. Right now I have refreshed myself on discreet math and basic calculus and will continue with more calculus. What other topics should I branch out into? I am interested in mathematics describing everything from techniques in static analysis to smt solving to reversing complex polynomial expressions in protected binaries.Practical resources showing how complex math is described through code would be great but any suggestions or advice at all is appreciated.Falset5_2qmd0FalseTruet3_smf4uhttp://www.reddit.com/r/ReverseEngineering/comments/smf4u/reverser_wanting_to_develop_mathematically/
1314316088.057dontstuffbeansupyournose.comjuka8Hardware Hacking for Software Peoples7ephen67106http://www.reddit.com/r/ReverseEngineering/comments/juka8/hardware_hacking_for_software_people/Falset5_2qmd0FalseFalset3_juka8http://dontstuffbeansupyournose.com/2011/08/25/hardware-hacking-for-software-people/
1298747649.053psx-scene.comftamoPS3 hacker graf_chokolo releases his IDB files after being raided by the German police on Sony's behest; link contains mirrorswarez_scene61817http://www.reddit.com/r/ReverseEngineering/comments/ftamo/ps3_hacker_graf_chokolo_releases_his_idb_files/Falset5_2qmd0FalseFalset3_ftamohttp://psx-scene.com/forums/f118/[repository]-back-up-graf_chokolos-hv-bible-81762/index5.html#post760989
1296007055.054blog.ksplice.comf937e8 gdb tricks you should knowsanitybit5952http://www.reddit.com/r/ReverseEngineering/comments/f937e/8_gdb_tricks_you_should_know/Falset5_2qmd0FalseFalset3_f937ehttp://blog.ksplice.com/2011/01/8-gdb-tricks/
1287902677.055mercurynews.comdvkv612-year old researcher finds critical bug in Firefox and gets $3k bug bounty: brunt_65108http://www.reddit.com/r/ReverseEngineering/comments/dvkv6/12year_old_researcher_finds_critical_bug_in/Falset5_2qmd0FalseFalset3_dvkv6http://www.mercurynews.com/san-jose-neighborhoods/ci_16401891
1310459646.050wired.comin8vnHow Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in Historycavedave61118http://www.reddit.com/r/ReverseEngineering/comments/in8vn/how_digital_detectives_deciphered_stuxnet_the/Falset5_2qmd0FalseFalset3_in8vnhttp://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1
1296998766.056wired.comfg9t7Cracking the Scratch Lottery Codemovzx6157http://www.reddit.com/r/ReverseEngineering/comments/fg9t7/cracking_the_scratch_lottery_code/Falset5_2qmd0FalseFalset3_fg9t7http://www.wired.com/magazine/2011/01/ff_lottery/
1374703731.051self.ReverseEngineering1izityCantor.dust. - a binary visualization toolgalaris60913http://www.reddit.com/r/ReverseEngineering/comments/1izity/cantordust_a_binary_visualization_tool/I'm surprised that this was not posted here before.From their site :>cantor.dust. is an interactive binary visualization tool, a radical evolution of the traditional hex editor. By translating >binary information to a visual abstraction, reverse engineers and forensic analysts can sift through mountains of >arbitrary data in seconds. Even previously unseen instruction sets and data formats can be easily located and >understood through their visual fingerprint.[Presentation video @ Derbycon](http://www.youtube.com/watch?v=4bM3Gut1hIk)[Official site](https://sites.google.com/site/xxcantorxdustxx/)[Pics.](https://sites.google.com/site/xxcantorxdustxx/visual-re)[Download demo.](https://media.blackhat.com/bh-us-12/Arsenal/Domas/_cantor.dust_.7z.zip)Falset5_2qmd0FalseTruet3_1izityhttp://www.reddit.com/r/ReverseEngineering/comments/1izity/cantordust_a_binary_visualization_tool/
1366329623.054webstersprodigy.net1cn6kzUsing windbg to beat my dad at chess (beginner)webstersprodigy65114http://www.reddit.com/r/ReverseEngineering/comments/1cn6kz/using_windbg_to_beat_my_dad_at_chess_beginner/Falset5_2qmd0FalseFalset3_1cn6kzhttp://webstersprodigy.net/2013/04/18/using-windbg-to-beat-my-dad-at-chess/
1359328534.053area51.stackexchange.com17e6mrDo you like StackExchange? Why not vote for the proposed Reverse Engineering StackExchange site?rolfr61812http://www.reddit.com/r/ReverseEngineering/comments/17e6mr/do_you_like_stackexchange_why_not_vote_for_the/Falset5_2qmd0FalseFalset3_17e6mrhttp://area51.stackexchange.com/proposals/49551/reverse-engineering?referrer=tMnjk2Xy4m_6biNthqvlIQ2
1346268860.050twitch.tvz1aigI'm a professional MMO bot maker, live streaming my protocol update process for users and explaining things as I go along. Feel free to watch and ask questions about the business and the process. Starting 8/29 @ ~7:30 US Eastern Time.NickCano671725http://www.reddit.com/r/ReverseEngineering/comments/z1aig/im_a_professional_mmo_bot_maker_live_streaming_my/Falset5_2qmd0FalseFalset3_z1aighttp://www.twitch.tv/darkstar_xeno#
1265038101.053code.google.comawphcOSpy -- reverse-engineering tool for spying on Windows softwaremebrahim6189http://www.reddit.com/r/ReverseEngineering/comments/awphc/ospy_reverseengineering_tool_for_spying_on/Falset5_2qmd0FalseFalset3_awphchttp://code.google.com/p/ospy/
1326767927.055bitbucket.orgok8cgPokeRed Disassembledthisisaslongasitcanb62711http://www.reddit.com/r/ReverseEngineering/comments/ok8cg/pokered_disassembled/Falset5_2qmd0FalseFalset3_ok8cghttps://bitbucket.org/iimarckus/pokered/src
1325116040.049self.ReverseEngineeringnu7kyAdministrivia: /r/ReverseEngineering has reached 10,000 subscribersrolfr611214http://www.reddit.com/r/ReverseEngineering/comments/nu7ky/administrivia_rreverseengineering_has_reached/When I started this project over three years ago, I wasn't even aware that there were ten thousand people on earth interested in reverse engineering. We've had several thousand submissions in the meantime, and this site is the second result on Google for 'reverse engineering' (fourth result if I try the same search on my phone). I've personally learned a ton in that time, and I hope it's been useful for everyone else as well. The variety of different types of information posted here is pretty amazing, and differentiates us from other reverse engineering sites in my opinion.Thanks to the usual suspects: those who post good submissions, those who write useful comments, my fellow moderators, and the readers. May /r/ReverseEngineering in 2012 continue to be the Internet's premiere channel for dissemination of information about the craft.Falset5_2qmd0FalseTruet3_nu7kyhttp://www.reddit.com/r/ReverseEngineering/comments/nu7ky/administrivia_rreverseengineering_has_reached/moderator
1306730691.052devttys0.comhn9h6Reverse Engineering Firmware: Linksys WAG120N5643http://www.reddit.com/r/ReverseEngineering/comments/hn9h6/reverse_engineering_firmware_linksys_wag120n/Falset5_2qmd0FalseFalset3_hn9h6http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/
1304785427.054ted.comh6545Ted Talks - Cracking Stuxnet, a 21st-century cyber weapon5955http://www.reddit.com/r/ReverseEngineering/comments/h6545/ted_talks_cracking_stuxnet_a_21stcentury_cyber/Falset5_2qmd0FalseFalset3_h6545http://www.ted.com/talks/ralph_langner_cracking_stuxnet_a_21st_century_cyberweapon.html
1297440329.052cs.sjtu.edu.cnfjhzpWindows Internals Course5532http://www.reddit.com/r/ReverseEngineering/comments/fjhzp/windows_internals_course/Falset5_2qmd0FalseFalset3_fjhzphttp://www.cs.sjtu.edu.cn/~kzhu/cs490/
1371351106.051popc64.blogspot.com1gfn2vA ten-part series on reverse engineering Prince of Persia and porting it to the C64rolfr62112http://www.reddit.com/r/ReverseEngineering/comments/1gfn2v/a_tenpart_series_on_reverse_engineering_prince_of/Falset5_2qmd0FalseFalset3_1gfn2vhttp://popc64.blogspot.com/2011/10/part-one-why-hell-would-anyone-want-to.html
1356806061.050youtube.com15mt2j'And finally, I just wanted to have fun, 'cause you know all those cool kids going out, going to clubs, they just haven't discovered reverse engineering yet.' - Natalie Silvanovichsamuirai732313http://www.reddit.com/r/ReverseEngineering/comments/15mt2j/and_finally_i_just_wanted_to_have_fun_cause_you/Falset5_2qmd0FalseFalset3_15mt2jhttp://www.youtube.com/watch?v=NdQBsTZ5xcU
1349874865.051twitch.tv1190aeI'm a professional MMO bot maker, live streaming my protocol update process for users and explaining things as I go along. Feel free to watch and ask questions about the business and the process. Starting 10/10 @ ~5:30 US Eastern Time.NickCano792821http://www.reddit.com/r/ReverseEngineering/comments/1190ae/im_a_professional_mmo_bot_maker_live_streaming_my/Falset5_2qmd0FalseFalset3_1190aehttp://www.twitch.tv/darkstar_xeno#
1336536483.052manoharvanga.comte696hackme: Deconstructing an ELF Filethe_droid5756http://www.reddit.com/r/ReverseEngineering/comments/te696/hackme_deconstructing_an_elf_file/Falset5_2qmd0FalseFalset3_te696http://www.manoharvanga.com/hackme/
1334440789.048phrack.orgsa082Phrack Magazine, issue 68rolfr5791http://www.reddit.com/r/ReverseEngineering/comments/sa082/phrack_magazine_issue_68/Falset5_2qmd0FalseFalset3_sa082http://phrack.org/issues.html?issue=68
1314077905.051self.ReverseEngineeringjres0So, who wants to pull Download.com's new malware apart?voltagex60919http://www.reddit.com/r/ReverseEngineering/comments/jres0/so_who_wants_to_pull_downloadcoms_new_malware/See http://www.reddit.com/r/technology/comments/jqvo8/downloadcom_now_wraps_downloads_in_its_own/ for detailsFalset5_2qmd0FalseTruet3_jres0http://www.reddit.com/r/ReverseEngineering/comments/jres0/so_who_wants_to_pull_downloadcoms_new_malware/
1291664772.052hex-rays.comeh6q9IDA Pro Freeware updated to version 5.0igor_sk631125http://www.reddit.com/r/ReverseEngineering/comments/eh6q9/ida_pro_freeware_updated_to_version_50/Falset5_2qmd0FalseFalset3_eh6q9http://www.hex-rays.com/idapro/idadownfreeware.htm?rrr
1367334610.053negrebskoh.net1dexa2Manually creating an ELF executablegagomes5633http://www.reddit.com/r/ReverseEngineering/comments/1dexa2/manually_creating_an_elf_executable/Falset5_2qmd0FalseFalset3_1dexa2http://www.negrebskoh.net/howto/howto_elf_exec.html
1351757646.051devttys0.com12g6a2Reverse Engineering Serial PortsN3mes1s5769http://www.reddit.com/r/ReverseEngineering/comments/12g6a2/reverse_engineering_serial_ports/Falset5_2qmd0FalseFalset3_12g6a2http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/
1320026919.051attrition.orgluonpA warning to those who post technical content on the Internet -- Infosec Institute plagiarized course material from Corelan.berolfr64139http://www.reddit.com/r/ReverseEngineering/comments/luonp/a_warning_to_those_who_post_technical_content_on/Falset5_2qmd0FalseFalset3_luonphttp://attrition.org/errata/plagiarism/infosec_institute/
1376419100.052research.swtch.com1kam85Reverse engineering and patching the OSX kernel to allow user mode CPU profilingDingDongHelloWhoIsIt5420http://www.reddit.com/r/ReverseEngineering/comments/1kam85/reverse_engineering_and_patching_the_osx_kernel/Falset5_2qmd0FalseFalset3_1kam85http://research.swtch.com/macpprof
1374099787.051os-fun.blogspot.com1iinajModifying a Laptop BIOS for Fun and Profitpointfree5437http://www.reddit.com/r/ReverseEngineering/comments/1iinaj/modifying_a_laptop_bios_for_fun_and_profit/Falset5_2qmd0FalseFalset3_1iinajhttp://os-fun.blogspot.com/2006/05/modifying-laptop-bios-for-fun-and.html
1364875300.048reverseengineering.stackexchange.com1bhsq7The Reverse Engineering Stack Exchange is now in public beta. Please sign up and participate if you did not already do so during the private beta.rolfr611319http://www.reddit.com/r/ReverseEngineering/comments/1bhsq7/the_reverse_engineering_stack_exchange_is_now_in/Falset5_2qmd0FalseFalset3_1bhsq7http://reverseengineering.stackexchange.com/
1351337843.047ilspy.net1264akILSpy is an open-source .NET assembly browser and decompiler.sanitybit59124http://www.reddit.com/r/ReverseEngineering/comments/1264ak/ilspy_is_an_opensource_net_assembly_browser_and/Falset5_2qmd0FalseFalset3_1264akhttp://ilspy.net
1343664635.049thelegendofrandom.comxeaasR4ndom's sixteenth Tutorial for Reverse Engineering, part 1RandomNetzley68190http://www.reddit.com/r/ReverseEngineering/comments/xeaas/r4ndoms_sixteenth_tutorial_for_reverse/Falset5_2qmd0FalseFalset3_xeaashttp://thelegendofrandom.com/blog/archives/957
1342455808.050thelegendofrandom.comwne26R4ndom's fourteenth tutorial on beginning reverse engineeringRandomNetzley67174http://www.reddit.com/r/ReverseEngineering/comments/wne26/r4ndoms_fourteenth_tutorial_on_beginning_reverse/Falset5_2qmd0FalseFalset3_wne26http://thelegendofrandom.com/blog/archives/933
1338576079.050hex-rays.comufzo1IDA 6.3 releasedadvanced_reddit_user57711http://www.reddit.com/r/ReverseEngineering/comments/ufzo1/ida_63_released/Falset5_2qmd0FalseFalset3_ufzo1http://hex-rays.com/products/ida/6.3/index.shtml
1311550043.049ohthehugemanatee.netiyoyixpost: What Happened When I Asked Nicely for a Protocol Specificationmankyd59100http://www.reddit.com/r/ReverseEngineering/comments/iyoyi/xpost_what_happened_when_i_asked_nicely_for_a/Falset5_2qmd0FalseFalset3_iyoyihttp://ohthehugemanatee.net/article/11/
1301015976.049blogmal.42.orggaxhzThe tale of a TCP bug mustapha_5670http://www.reddit.com/r/ReverseEngineering/comments/gaxhz/the_tale_of_a_tcp_bug/Falset5_2qmd0FalseFalset3_gaxhzhttp://blogmal.42.org/tidbits/tcp-bug.story
1284673778.052langner.comdewl6An analysis of Stuxnet's SCADA rootkit functionality (scary)rolfr59713http://www.reddit.com/r/ReverseEngineering/comments/dewl6/an_analysis_of_stuxnets_scada_rootkit/Falset5_2qmd0FalseFalset3_dewl6http://www.langner.com/en/index.htm
1275639701.049ollydbg.decbc8iOllydbg v2.0 final release!wtbw5125http://www.reddit.com/r/ReverseEngineering/comments/cbc8i/ollydbg_v20_final_release/Falset5_2qmd0FalseFalset3_cbc8ihttp://www.ollydbg.de/version2.html?
1363088166.049adamsblog.aperturelabs.com1a54onObviously a Major Malfunction..: You can ring my bell! Adventures in sub-GHz RF land..simpleuser61126http://www.reddit.com/r/ReverseEngineering/comments/1a54on/obviously_a_major_malfunction_you_can_ring_my/Falset5_2qmd0FalseFalset3_1a54onhttp://adamsblog.aperturelabs.com/2013/03/you-can-ring-my-bell-adventures-in-sub.html
1307877912.046altdevblogaday.orghxpxcJIT CPU Emulation: A 6502 to x86 Dynamic Recompiler (Part 1)polsab5152http://www.reddit.com/r/ReverseEngineering/comments/hxpxc/jit_cpu_emulation_a_6502_to_x86_dynamic/Falset5_2qmd0FalseFalset3_hxpxchttp://altdevblogaday.org/2011/06/12/jit-cpu-emulation-a-6502-to-x86-dynamic-recompiler-part-1/
1271850271.049csh.rit.edubu2akFun with YouTube's Audio Content ID System__y5235http://www.reddit.com/r/ReverseEngineering/comments/bu2ak/fun_with_youtubes_audio_content_id_system/Falset5_2qmd0FalseFalset3_bu2akhttp://www.csh.rit.edu/~parallax/
1247509093.044hackerschool.org90ta8Solving the Defcon b300 challenge [comic]moyix5286http://www.reddit.com/r/ReverseEngineering/comments/90ta8/solving_the_defcon_b300_challenge_comic/Falset5_2qmd0FalseFalset3_90ta8http://hackerschool.org/DefconCTF/17/B300.html
1375729388.048blog.ioactive.com1jrab1The definitive introduction to car hacking (PDF in link)mattbarn5577http://www.reddit.com/r/ReverseEngineering/comments/1jrab1/the_definitive_introduction_to_car_hacking_pdf_in/Falset5_2qmd0FalseFalset3_1jrab1http://blog.ioactive.com/2013/08/car-hacking-content.html
1371248210.044reverseengineering.stackexchange.com1gd81uWhat is DLL Injection and how is it used for reversing?rolfr52811http://www.reddit.com/r/ReverseEngineering/comments/1gd81u/what_is_dll_injection_and_how_is_it_used_for/Falset5_2qmd0FalseFalset3_1gd81uhttp://reverseengineering.stackexchange.com/questions/2252/what-is-dll-injection-and-how-is-it-used-for-reversing
1369711817.047dtic.mil1f6freUnderstanding how Reverse Engineers Make Sense of Programs from Assembly Language Representations by Adam R. Bryant [PDF]turnersr64179http://www.reddit.com/r/ReverseEngineering/comments/1f6fre/understanding_how_reverse_engineers_make_sense_of/Falset5_2qmd0FalseFalset3_1f6frehttp://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA557042
1366656069.045lastline.com1cvnpkblog post about a strange backdoor which also attempts to evade sandboxes and antivirusll_kyle5277http://www.reddit.com/r/ReverseEngineering/comments/1cvnpk/blog_post_about_a_strange_backdoor_which_also/Falset5_2qmd0FalseFalset3_1cvnpkhttp://www.lastline.com/analysis-of-an-evasive-backdoor
1359993878.048oamajormal.blogspot.co.uk17vdduMicroscope + Masked ROM + OpenCV = rompar , semi-automated data extraction from masked roms.niko-r59118http://www.reddit.com/r/ReverseEngineering/comments/17vddu/microscope_masked_rom_opencv_rompar_semiautomated/Falset5_2qmd0FalseFalset3_17vdduhttp://oamajormal.blogspot.co.uk/2013/01/fun-with-masked-roms.html
1349740719.047devttys0.com1160ngExploiting a MIPS stack based buffer overflowdevttys05692http://www.reddit.com/r/ReverseEngineering/comments/1160ng/exploiting_a_mips_stack_based_buffer_overflow/Falset5_2qmd0FalseFalset3_1160nghttp://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/
1343096500.049blog.eset.comx1uocFlame, Duqu and Stuxnet: in-depth code analysis of mssecmgr.ocxvirvdova5014http://www.reddit.com/r/ReverseEngineering/comments/x1uoc/flame_duqu_and_stuxnet_indepth_code_analysis_of/Falset5_2qmd0FalseFalset3_x1uochttp://blog.eset.com/2012/07/20/flame-in-depth-code-analysis-of-mssecmgr-ocx
1334317130.047self.ReverseEngineerings7sdlHelp! Trying to make sense of an old AGFA xray image format (contains xrays of cats!)nrpe54738http://www.reddit.com/r/ReverseEngineering/comments/s7sdl/help_trying_to_make_sense_of_an_old_agfa_xray/My girlfriend works at a Vet clinic, and they have an old hospital xray machine, the server runs an old version of solaris with oracle db, and we found a partition containing all of the data files.These xrays would be much more useful to the vet if he could email them around to specialists, or even put them on USB stick. Currently he has to print them to get them off the machine in any decent resolution.There is no technical support for this machine, it was installed around the year 2000 in the hospital and came to the vet in the last year or so, with no maintenance contract.I've had a few attempts now of trying to decode the image formats, and got a little way, but not the full resolution image.* Each xray taken has several files associated; DBU, MSK, PYR, STS, HIS, IMG, MSK, PRL and RED* Only three files look like images with any amount of data: IMG, MSK and PYR. The others seem to be metadata.* The MSK looks like a bit mask, so not too interested in that.* The IMG is a thumbnail of the full resolution image. It is a plain greyscale bitmap. A basic header with dimensions and 8 bits per pixel.* The PYR is the unknown format, the full resolution image (it's the biggest filesize!). I can read some of the headers, and have a bit of info on the contents, but couldn't figure it out enough to convert into an actual image.Here are the source image sets:* Set 1: http://jebus.geek.nz/xray/AGFA_REDDIT_SET_1.rar (3MB), 'JUPITER' xray files of a cat(omg reddit loves cats!?). ([decoded thumbnail png](http://jebus.geek.nz/xray/JUPITER_0_1.png))* Set 2: http://jebus.geek.nz/xray/AGFA_REDDIT_SET_2.rar (24MB), Collection of 10 xray sets, take note of the image RINTOUL_SOLO_1(overexposed, entirely white image)I'm hoping Reddit will be able to help me figure out the format of the PYR's. They don't look compressed, and are almost bitmap, but none of my bits-per-pixel calculations worked out properly.Sorry for the long post below, I'm just dumping what I've worked out so far, hopefully it's of some use to those playing the game. Thanks for any clues!---This is what I know of the **AGFA header**, and it seems to be consistent across multiple xrays and the image files:* 32 bytes of ascii header format identifier. Always 'AGFA MEDICAL IMAGING #0001'.* 4 bytes of ascii filetype identifier. Can be 'IMG','PYR' or 'MSK'* 4 byte integer, 'unknown_1'* 4 byte integer, 'unknown_2'. I believe this refers to the number of 'blocks' in the header. PYR has more than IMG.* 4 byte integer, 'data_content' This is the size in bytes of the data content. Does not include null footer before EOF.* 4 byte integer, 'width' in pixels* 4 byte integer, 'height' in pixels**IMG file format:*** After the basic header, the content starts at 0x80 and each byte is a greyscale value. This makes it easy to read and write a PNG so I wrote a converter.* Converter cpp code: http://jebus.geek.nz/xray/img2png.cpp**PYR file format:**The PYR header has 3 more 'blocks' in it than the IMG, here is the JUPITER example: unknown_1 = 5 unknown_2 = 5 (header blocks?) data_content = 4,479,372 width = 2040 height = 2570 unknown_3 = 274 unknown_4 = 274 unknown_5 = 843 unknown_6 = 3358 unknown_7 = 3 unknown_8 = 13 triplet_1_1 = (pointer)0x42AA2F73 = (int)1118449523 ??? = (float) ??? triplet_1_2 = 0x416c34bb = (int)1097610427 triplet_1_3 = 0x40D92B78 = (int)1087974264 triplet_2_1 = 0x3F477121 = (int)1061646625 triplet_2_2 = 0x3F30B659 = (int)1060157017 triplet_2_3 = 0x3f0a3715 = (int)1057634069 unknown_9 = 0x4012F1AA = (int)1074983338I can calculate some values from this: width*height = 5,242,800 pixels actual_filesize(disk) = 4,479,744 actual_filesize-pixel_count = 372 = non_data_size header_size = 320 null_footer = 52 bytes header_size+null_footer = 372 = non_data_sizeIn all PYR images of size 2570x2040, data changes at 0x35a0e to a different style. Don't know what this means, yet. 0x140 to 0x35a0e = 219,342 bytes (style 1) 0x35a0e to 0x445acc = 4,260,030 bytes (style 2) style1 and style2 are multiple of 16, minus 2 bytes. style1 seems to be 16 bit alignedPYR files of pixel size 2570x2040 are 4375KB, but 2040x2570 are 4262KB. Same pixel count, different data size.Falset5_2qmd0TrueTruet3_s7sdlhttp://www.reddit.com/r/ReverseEngineering/comments/s7sdl/help_trying_to_make_sense_of_an_old_agfa_xray/
1304055047.043hackerfactor.comgzxm3After Birth: A look at Obama's PDF Birth Certificate and how PDFs store imagesikkaiteku551210http://www.reddit.com/r/ReverseEngineering/comments/gzxm3/after_birth_a_look_at_obamas_pdf_birth/Falset5_2qmd0FalseFalset3_gzxm3http://www.hackerfactor.com/blog/index.php?/archives/428-After-Birth.html
1290948616.047myne-us.blogspot.comecuabFrom 0x90 to 0x4c454554, a journey into exploitation.sanitybit5584http://www.reddit.com/r/ReverseEngineering/comments/ecuab/from_0x90_to_0x4c454554_a_journey_into/Falset5_2qmd0FalseFalset3_ecuabhttp://myne-us.blogspot.com/2010/08/from-0x90-to-0x4c454554-journey-into.html
1372036185.046github.com1gxur5An IDA plugin that attempts to decompile x64turnersr4932http://www.reddit.com/r/ReverseEngineering/comments/1gxur5/an_ida_plugin_that_attempts_to_decompile_x64/Falset5_2qmd0FalseFalset3_1gxur5https://github.com/EiNSTeiN-/ida-decompiler
1364950847.046malshare.com1bk0vsMalShare - Open Malware Sample Exchangeitsnotapt591322http://www.reddit.com/r/ReverseEngineering/comments/1bk0vs/malshare_open_malware_sample_exchange/Falset5_2qmd0FalseFalset3_1bk0vshttp://malshare.com/
1357312155.045ftp.ccc.de15yaum29C3 recordingsigor_sk57125http://www.reddit.com/r/ReverseEngineering/comments/15yaum/29c3_recordings/Falset5_2qmd0FalseFalset3_15yaumhttp://ftp.ccc.de/congress/29C3/
1350940257.049trapbit.com11wlutA document about Blu-Ray player hacking [PDF]rolfr5452http://www.reddit.com/r/ReverseEngineering/comments/11wlut/a_document_about_bluray_player_hacking_pdf/Falset5_2qmd0FalseFalset3_11wluthttp://www.trapbit.com/reports/blueray-blues-1.pdf
1343824574.044devttys0.comxi41uReverse engineering a DTV converter's firmwaredevttys05061http://www.reddit.com/r/ReverseEngineering/comments/xi41u/reverse_engineering_a_dtv_converters_firmware/Falset5_2qmd0FalseFalset3_xi41uhttp://www.devttys0.com/2012/08/reverse-engineering-a-dtv-converter/
1339424416.044securelist.comuw5uwStuxnet and Flame malware share connectionteem5287http://www.reddit.com/r/ReverseEngineering/comments/uw5uw/stuxnet_and_flame_malware_share_connection/Falset5_2qmd0FalseFalset3_uw5uwhttps://www.securelist.com/en/blog/208193568/Back_to_Stuxnet_the_missing_link
1307361572.045jsz.github.comhss70OS X malware analysis for beginners: reverse engineering Mac Defenderigor_sk5162http://www.reddit.com/r/ReverseEngineering/comments/hss70/os_x_malware_analysis_for_beginners_reverse/Falset5_2qmd0FalseFalset3_hss70http://jsz.github.com/reverse_engineering_mac_defender.html
1290062174.048ladyada.nete7yufUSB Reverse Engineering Tutorial with the XBox Kinect.aw4lly4910http://www.reddit.com/r/ReverseEngineering/comments/e7yuf/usb_reverse_engineering_tutorial_with_the_xbox/Falset5_2qmd0FalseFalset3_e7yufhttp://ladyada.net/learn/diykinect/
1367167747.049github.com1da222Self-modifying Python bytecodeturnersr66175http://www.reddit.com/r/ReverseEngineering/comments/1da222/selfmodifying_python_bytecode/Falset5_2qmd0FalseFalset3_1da222https://github.com/0vercl0k/stuffz/blob/master/Python%27s%20internals/wildfire.py
1365052408.044blog.coresecurity.com1bn6c9MS13-017 - The harmless silent patch..rolfr58147http://www.reddit.com/r/ReverseEngineering/comments/1bn6c9/ms13017_the_harmless_silent_patch/Falset5_2qmd0FalseFalset3_1bn6c9http://blog.coresecurity.com/2013/04/01/ms13-017-the-harmless-silent-patch/
1346099075.048thelegendofrandom.comyx6poR4ndom's Nineteenth Tutorial on Beginning Reverse EngineeringRandomNetzley68201http://www.reddit.com/r/ReverseEngineering/comments/yx6po/r4ndoms_nineteenth_tutorial_on_beginning_reverse/Falset5_2qmd0FalseFalset3_yx6pohttp://thelegendofrandom.com/blog/archives/1875
1338925683.0460xc3.usuml7eGames for Windows – Live (about RE, despite the title)rolfr5263http://www.reddit.com/r/ReverseEngineering/comments/uml7e/games_for_windows_live_about_re_despite_the_title/Falset5_2qmd0FalseFalset3_uml7ehttp://0xc3.us/b/?p=82
1330717470.048bioshacking.blogspot.comqev2uBIOS Disassembly Ninjutsu Uncovered (1st Edition) [Unedited] PDF releasedigor_sk5682http://www.reddit.com/r/ReverseEngineering/comments/qev2u/bios_disassembly_ninjutsu_uncovered_1st_edition/Falset5_2qmd0FalseFalset3_qev2uhttp://bioshacking.blogspot.com/2012/02/bios-disassembly-ninjutsu-uncovered-1st.html
1324173208.046reddit.comngwibPlease help reverse-engineer insulin pump USB transceiver driver from jar (x-post from /r/diabetes)awaxa571120http://www.reddit.com/r/ReverseEngineering/comments/ngwib/please_help_reverseengineer_insulin_pump_usb/Falset5_2qmd0FalseFalset3_ngwibhttp://www.reddit.com/r/diabetes/comments/ngwfv/its_a_violation_of_my_privacy_for/
1322529783.043self.ReverseEngineeringmsq95/r/ReverseEngineering's Q4 2011 Hiring Threadrolfr551216http://www.reddit.com/r/ReverseEngineering/comments/msq95/rreverseengineerings_q4_2011_hiring_thread/By popular request (moderator mail), we in /r/ReverseEngineering are running an experiment along the lines of what [/r/netsec](http://www.reddit.com/r/netsec/) is doing with [its hiring thread](http://www.reddit.com/r/netsec/comments/mrusc/rnetsecs_q4_2011_information_security_hiring/). The success of the experiment will dictate whether it is repeated.If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s).Please elucidate along the following lines:* Give as thorough of a description of the position as is possible without violating NDAs/secrecy requirements associated with classified work.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/#!/RolfRolles/status/141326499029598208) couldn't hurt.Thanks in advance, and additional thanks to the moderators of /r/netsec for the idea.Falset5_2qmd0FalseTruet3_msq95http://www.reddit.com/r/ReverseEngineering/comments/msq95/rreverseengineerings_q4_2011_hiring_thread/
1292156921.044internetopenurla.blogspot.comekh8rStep by Step Malware Reversing. One sample from the wild each month.sanitybit4620http://www.reddit.com/r/ReverseEngineering/comments/ekh8r/step_by_step_malware_reversing_one_sample_from/Falset5_2qmd0FalseFalset3_ekh8rhttp://internetopenurla.blogspot.com/
1285154427.045symantec.comdhagsExploring Stuxnet’s PLC Infection Processcavedave4610http://www.reddit.com/r/ReverseEngineering/comments/dhags/exploring_stuxnets_plc_infection_process/Falset5_2qmd0FalseFalset3_dhagshttp://www.symantec.com/connect/blogs/exploring-stuxnet-s-plc-infection-process
1369863127.043sarvamblog.blogspot.com1famhcNearly 70% of Packed Windows System files are labeled as Malwarelaks316561327http://www.reddit.com/r/ReverseEngineering/comments/1famhc/nearly_70_of_packed_windows_system_files_are/Falset5_2qmd0FalseFalset3_1famhchttp://sarvamblog.blogspot.com/2013/05/nearly-70-of-packed-windows-system.html
1365453142.045blog.azimuthsecurity.com1bxvjeUnlocking the Motorola Bootloader by exploting TrustZoneigor_sk57123http://www.reddit.com/r/ReverseEngineering/comments/1bxvje/unlocking_the_motorola_bootloader_by_exploting/Falset5_2qmd0FalseFalset3_1bxvjehttp://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html
1363698994.047hopperapp.tumblr.com1al9svHopper: new view, and full-time job!simpleuser4926http://www.reddit.com/r/ReverseEngineering/comments/1al9sv/hopper_new_view_and_fulltime_job/Falset5_2qmd0FalseFalset3_1al9svhttp://hopperapp.tumblr.com/post/45751859950/it-has-been-a-while-since-the-last-time-i-updated
1359927964.041area51.stackexchange.com17tt6pFor those interested in the Reverse Engineering StackOverflow, we have hit the subscriber goal; now we need to propose example questions, and 35 more sample questions need 10+ votes apiecerolfr541312http://www.reddit.com/r/ReverseEngineering/comments/17tt6p/for_those_interested_in_the_reverse_engineering/Falset5_2qmd0FalseFalset3_17tt6phttp://area51.stackexchange.com/proposals/49551/reverse-engineering?referrer=tMnjk2Xy4m_6biNthqvlIQ2?
1355590610.040hopperapp.com14we1uSo, Hopper for Windows and Linux is a thing now.abadidea591913http://www.reddit.com/r/ReverseEngineering/comments/14we1u/so_hopper_for_windows_and_linux_is_a_thing_now/Falset5_2qmd0FalseFalset3_14we1uhttp://www.hopperapp.com/download.html
1345674310.041thelegendofrandom.comynuxiR4ndom's Eighteenth tutorial on Beginning Reverse EngineeringRandomNetzley69284http://www.reddit.com/r/ReverseEngineering/comments/ynuxi/r4ndoms_eighteenth_tutorial_on_beginning_reverse/Falset5_2qmd0FalseFalset3_ynuxihttp://thelegendofrandom.com/blog/archives/1603
1322219512.045docs.google.commosx3Encyclopedia of Windows Privilege Escalationamirreza685055http://www.reddit.com/r/ReverseEngineering/comments/mosx3/encyclopedia_of_windows_privilege_escalation/Falset5_2qmd0FalseFalset3_mosx3https://docs.google.com/viewer?url=http://www.insomniasec.com/publications/WindowsPrivEsc.ppt
1318969413.045symantec.comlgntvW32.Duqunewgre5160http://www.reddit.com/r/ReverseEngineering/comments/lgntv/w32duqu/Falset5_2qmd0FalseFalset3_lgntvhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers//w32_duqu_the_precursor_to_the_next_stuxnet.pdf
1302300714.043hex-rays.comglsssIDA 6.1 Released Today!hellixor52916http://www.reddit.com/r/ReverseEngineering/comments/glsss/ida_61_released_today/Falset5_2qmd0FalseFalset3_glssshttp://www.hex-rays.com/idapro/61/index.html
1264471709.046swars.vexillium.orgau5c2A 'port' of the DOS game 'Syndicate Wars' for modern OSes made through extensive binary analysisrolfr49313http://www.reddit.com/r/ReverseEngineering/comments/au5c2/a_port_of_the_dos_game_syndicate_wars_for_modern/Falset5_2qmd0FalseFalset3_au5c2http://swars.vexillium.org/
1375176153.043phys.org1jc7llComputer scientists develop 'mathematical jigsaw puzzles' to encrypt softwareigor_sk51811http://www.reddit.com/r/ReverseEngineering/comments/1jc7ll/computer_scientists_develop_mathematical_jigsaw/Falset5_2qmd0FalseFalset3_1jc7llhttp://phys.org/news/2013-07-scientists-mathematical-jigsaw-puzzles-encrypt.html
1359318808.045stackoverflow.com17dv5cInteresting bit-twiddling hack question on StackOverflow, with an elegant theorem-prover based solutionrolfr55103http://www.reddit.com/r/ReverseEngineering/comments/17dv5c/interesting_bittwiddling_hack_question_on/Falset5_2qmd0FalseFalset3_17dv5chttp://stackoverflow.com/questions/14547087/extracting-bits-with-a-single-multiplication/14551792
1357668113.040self.ReverseEngineering16706w/r/ReverseEngineering's Q1 2013 Hiring Threadrolfr541413http://www.reddit.com/r/ReverseEngineering/comments/16706w/rreverseengineerings_q1_2013_hiring_thread/Happy new year, folks.If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s). Failure to provide the details in the following format and/or answer questions will result in the post's removal.Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/RolfRolles/status/288708985551458304) couldn't hurt.Falset5_2qmd01357668610.0Truet3_16706whttp://www.reddit.com/r/ReverseEngineering/comments/16706w/rreverseengineerings_q1_2013_hiring_thread/
1357438567.043surfsec.wordpress.com161eqoCircumventing Windows RT’s Code Integrity Mechanismclrokr4744http://www.reddit.com/r/ReverseEngineering/comments/161eqo/circumventing_windows_rts_code_integrity_mechanism/Falset5_2qmd0FalseFalset3_161eqohttp://surfsec.wordpress.com/2013/01/06/circumventing-windows-rts-code-integrity-mechanism/
1354041651.043adafruit.com13vw2eReverse Engineering Holiday Gift Guidekasbah4637http://www.reddit.com/r/ReverseEngineering/comments/13vw2e/reverse_engineering_holiday_gift_guide/Falset5_2qmd0FalseFalset3_13vw2ehttp://www.adafruit.com/blog/2012/11/27/adafruit-holiday-gift-guide-2012-reverse-engineering/
1342010524.042crackingagrippa.netwdrl4Crack William Gibson's Agrippacavedave4534http://www.reddit.com/r/ReverseEngineering/comments/wdrl4/crack_william_gibsons_agrippa/Falset5_2qmd0FalseFalset3_wdrl4http://www.crackingagrippa.net/
1333767178.043fail0verflow.comrxbzeAT&T Microcell FAIL (x-post r/netsec)MrDOS53106http://www.reddit.com/r/ReverseEngineering/comments/rxbze/att_microcell_fail_xpost_rnetsec/Falset5_2qmd0FalseFalset3_rxbzehttp://fail0verflow.com/blog/2012/microcell-fail.html
1324720440.043lurklurk.orgnp0xnBeginner's Guide to Linkersrolfr4963http://www.reddit.com/r/ReverseEngineering/comments/np0xn/beginners_guide_to_linkers/Falset5_2qmd0FalseFalset3_np0xnhttp://www.lurklurk.org/linkers/linkers.html
1299319819.046sec.pn.tofxu9zYes, we also call this interposing (epic soldering!)bushing4823http://www.reddit.com/r/ReverseEngineering/comments/fxu9z/yes_we_also_call_this_interposing_epic_soldering/Falset5_2qmd0FalseFalset3_fxu9zhttp://sec.pn.to/pw/?plugin=attach&pcmd=open&file=tapping.jpg&refer=Bases
1372516377.041self.ReverseEngineering1hb7oyA series about basics of hardware reverse engineering on a wireless burglar alarmcybergibbons521112http://www.reddit.com/r/ReverseEngineering/comments/1hb7oy/a_series_about_basics_of_hardware_reverse/I started (but didn't really finish..) a series of posts reverse engineering several parts of a Friedland wireless burglar alarm. I will come back to finish it off at some point.The aim of these was to show people who are new to RE some of the tools and methods used with hardware and basic RF systems.* [Reverse engineering a wireless burglar alarm, part 1](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-system-part-1/) - spectrum analysis and basic signal capture with SDR* [Reverse engineering a wireless burglar alarm, part 2](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-2/) - breakdown of components and major circuit details* [Reverse engineering a wireless burglar alarm, part 3](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-3/) - sniffing SPI data between the microcontroller and CC1150 transceiver using the Saleae Logic* [Reverse engineering a wireless burglar alarm, part 4](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-4/) - manually decoding some of the SPI traffic using the CC1150 data sheet* [Reverse engineering a wireless burglar alarm, part 5](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-5/) - working out the data encoding between devices in the alarm system* [Reverse engineering a wireless burglar alarm, part 6](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-6/) - working out what the individual bits in the data between the devices mean* [Reverse engineering a wireless burglar alarm, part 7](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-7/) - setting up the hardware to replay the signal from a device* [Reverse engineering a wireless burglar alarm, part 8](http://cybergibbons.com/uncategorized/reverse-engineering-a-wireless-burglar-alarm-part-8/) - writing software to replay the signal from a deviceFalset5_2qmd01372540698.0Truet3_1hb7oyhttp://www.reddit.com/r/ReverseEngineering/comments/1hb7oy/a_series_about_basics_of_hardware_reverse/
1362069060.043codemachine.com19ehxhCatalog of key Windows kernel data structuresigor_sk4850http://www.reddit.com/r/ReverseEngineering/comments/19ehxh/catalog_of_key_windows_kernel_data_structures/Falset5_2qmd0FalseFalset3_19ehxhhttp://www.codemachine.com/article_kernelstruct.html
1356125495.038self.ReverseEngineering158xy8Rdis: A binary analysis tool for linuxrednovae51137http://www.reddit.com/r/ReverseEngineering/comments/158xy8/rdis_a_binary_analysis_tool_for_linux/Hello r/re. Long time lurker, first time poster.I just GPLed a project of mine I've been working on for a while now named rdis. This is a binary analysis tool for linux. It is in a semi-form of completion, but I have used it successfully for disassembly tasks and believe it provides utility in its current form.[Website](http://rainbowsandpwnies.com/rdis/) - [Screenshot](http://rainbowsandpwnies.com/rdis/ss18nov2012.png) - [Github](https://github.com/endeav0r/rdis)Rdis does not *currently* debug executables. I'll comment more on that if there's interest.While rdis currently supports ELF/PE 32/64-bit x86, you can write custom loaders in lua that provide most of the functionality available from the C loader. An example is available here: http://rednovae.blogspot.com/2012/11/writing-custom-loader-for-rdis.html . Of course, now that it's GPL you could also write your own loader in C.Reachable functions (I'm betting someone will ask) are functions which rdis believes are currently reachable. I implemented this after disassembling Go binaries which statically link their standard libraries and provide symbols for each function. Instead of searching through every function in the binary, you can search through just the functions rdis believes are reachable.*My main goal behind releasing rdis is feedback. Please let me know what you think (post-runtime). Consider it a transaction, code for feedback :). This reddit post is fine for feedback.***Other notes:*** Click on an instruction in the graph and hit semi-colon. You are now typing a comment for that instruction. Return ends the comment input.* Click on a node/vertex in the graph. Hit 'p'. Predecessor nodes/vertices are highlighted.* The first window you are looking at when running rdis accepts lua. Incomplete lua documentation available [here](http://rainbowsandpwnies.com/rdis/lua.html) . Rdis will look for and run ~/.rdis.lua each time you load an executable.* You won't be able to save executable loaded with a lua loader. This will have to wait until I find a way to package the lua code used to load the executable in with the saved rdis state.* Rdis saves its state in JSON, so you can pull information out of the json with your own tools. The json is a bit funky and mirrors rdis' object/container model; However, it shouldn't be too hard to figure out. You'll probably want to compress your saved rdis files.* From the hex view, right click a byte and select,'User Function,' to tell rdis to recursively disassemble from that byte. This is also available from instructions in the graph.* Call graphs for functions are available from the menu on right clicking a function in the function view.* References are built at runtime by map/reducing over the graphs holding instructions. c: is for constant, s: is for store, l: is for load. The IL (see src/rdil) isn't complete yet, so this information is only complete for the independent instruction in which the address was found.* Rdis is threaded. Your cores will help. It also makes healthy use of memory. The beefier your machine, the happier you will be.*I've added some basic documentation to the rdis site which covers most of the details above: http://rainbowsandpwnies.com/rdis/docs.html*Falset5_2qmd01356625240.0Truet3_158xy8http://www.reddit.com/r/ReverseEngineering/comments/158xy8/rdis_a_binary_analysis_tool_for_linux/
1355932820.041blog.lse.epita.fr1542xsEmulating the Gamecube audio processing in Dolphinsamcrem4651http://www.reddit.com/r/ReverseEngineering/comments/1542xs/emulating_the_gamecube_audio_processing_in_dolphin/Falset5_2qmd0FalseFalset3_1542xshttp://blog.lse.epita.fr/articles/38-emulating-the-gamecube-audio-processing-in-dolphin.html
1348873591.043blog.cmpxchg8b.com10n6jaFun with Constrained Programmingrolfr4965http://www.reddit.com/r/ReverseEngineering/comments/10n6ja/fun_with_constrained_programming/Falset5_2qmd0FalseFalset3_10n6jahttp://blog.cmpxchg8b.com/2012/09/fun-with-constrained-programming.html
1343331476.041demoseen.comx7fjtDaeken's paper on Onity hotel locksigor_sk57160http://www.reddit.com/r/ReverseEngineering/comments/x7fjt/daekens_paper_on_onity_hotel_locks/Falset5_2qmd0FalseFalset3_x7fjthttp://demoseen.com/bhpaper.html
1341509400.041thelegendofrandom.comw32esR4ndom's Beginning Reverse Engineering Tutorial #11RandomNetzley51100http://www.reddit.com/r/ReverseEngineering/comments/w32es/r4ndoms_beginning_reverse_engineering_tutorial_11/Falset5_2qmd0FalseFalset3_w32eshttp://thelegendofrandom.com/blog/archives/884
1338978098.042area51.stackexchange.comunqryReverse Engineering - Stack Exchange site proposalSkomski4530http://www.reddit.com/r/ReverseEngineering/comments/unqry/reverse_engineering_stack_exchange_site_proposal/Falset5_2qmd0FalseFalset3_unqryhttp://area51.stackexchange.com/proposals/26607/reverse-engineering
1314604313.043libxenon.orgjxs9zThe Xbox 360 reset glitch hacknewgre4742http://www.reddit.com/r/ReverseEngineering/comments/jxs9z/the_xbox_360_reset_glitch_hack/Falset5_2qmd0FalseFalset3_jxs9zhttp://libxenon.org/index.php?topic=145.0
1299043415.043self.ReverseEngineeringfvl9mWhere do I start learning to Reverse Engineer?yataf50713http://www.reddit.com/r/ReverseEngineering/comments/fvl9m/where_do_i_start_learning_to_reverse_engineer/I'm interested in how things are jail broken and what not but I'm at a complete loss as to where to even begin to understand the process. Can anybody get me started?Falset5_2qmd0FalseTruet3_fvl9mhttp://www.reddit.com/r/ReverseEngineering/comments/fvl9m/where_do_i_start_learning_to_reverse_engineer/
1294100322.038geohot.comevp8qPS3 Root Key Foundethicszen48103http://www.reddit.com/r/ReverseEngineering/comments/evp8q/ps3_root_key_found/Falset5_2qmd0FalseFalset3_evp8qhttp://www.geohot.com/
1368893049.042hex-rays.com1ekxkyHow does anyone actually afford IDA?voltagex6321143http://www.reddit.com/r/ReverseEngineering/comments/1ekxky/how_does_anyone_actually_afford_ida/Falset5_2qmd0FalseFalset3_1ekxkyhttps://www.hex-rays.com/cgi-bin/quote.cgi
1357499772.040taylorkillian.com162mngReversing a Firmware Uploader to get the Decrypted Firmware for a ST-Link/V2s7master4992http://www.reddit.com/r/ReverseEngineering/comments/162mng/reversing_a_firmware_uploader_to_get_the/Falset5_2qmd0FalseFalset3_162mnghttp://www.taylorkillian.com/2013/01/retrieving-st-linkv2-firmware-from.html
1351540039.038self.ReverseEngineering12ajwcHow to start out in reverse engineering? Help_I_Lost_my_face521448http://www.reddit.com/r/ReverseEngineering/comments/12ajwc/how_to_start_out_in_reverse_engineering/I'm sure this has been asked and answered, but I didn't see it in /r/ReverseEngineering. This subject is something I'm very interested in and would eventually like to get into malware analysis.Unfortunately, I have next to no real programming experience, but I've been trying to teach myself some of the higher languages to start out with and then switch to Assembly. I've done some digital forensics work, worked a lot in system networking as well as a whole lot of electronic repair. Does anyone have any useful advice? Languages to learn? Programs to learn? etc..Falset5_2qmd0FalseTruet3_12ajwchttp://www.reddit.com/r/ReverseEngineering/comments/12ajwc/how_to_start_out_in_reverse_engineering/
1349234350.038research.microsoft.com10utthZ3 is now Open Source(!!)tylerni747918http://www.reddit.com/r/ReverseEngineering/comments/10utth/z3_is_now_open_source/Falset5_2qmd0FalseFalset3_10utthhttp://research.microsoft.com/en-us/um/people/leonardo/blog/2012/10/02/open-z3.html
1341848802.044thelegendofrandom.comw9vzwR4andom's twelfth tutorial on reverse engineeringRandomNetzley60162http://www.reddit.com/r/ReverseEngineering/comments/w9vzw/r4andoms_twelfth_tutorial_on_reverse_engineering/Falset5_2qmd0FalseFalset3_w9vzwhttp://thelegendofrandom.com/blog/archives/1042
1337141872.037utdallas.edutpgivMalware Analysis Course Lecturesmaligare44717http://www.reddit.com/r/ReverseEngineering/comments/tpgiv/malware_analysis_course_lectures/Falset5_2qmd0FalseFalset3_tpgivhttp://www.utdallas.edu/~zhiqiang.lin/spring2012.html
1335473512.044github.comsu5jhDecoder for the binary Valve Data Formatbarneygale5394http://www.reddit.com/r/ReverseEngineering/comments/su5jh/decoder_for_the_binary_valve_data_format/Falset5_2qmd0FalseFalset3_su5jhhttps://github.com/barneygale/bvdf
1333414244.042self.ReverseEngineeringrqety/r/ReverseEngineering's Q2 2012 Hiring Threadrolfr47518http://www.reddit.com/r/ReverseEngineering/comments/rqety/rreverseengineerings_q2_2012_hiring_thread/If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s).Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/#!/RolfRolles/status/186979206989754368) couldn't hurt.See also: [/r/netsec's Q2 2012 hiring thread](http://www.reddit.com/r/netsec/comments/romsb/rnetsecs_q2_2012_information_security_hiring/).Falset5_2qmd0FalseTruet3_rqetyhttp://www.reddit.com/r/ReverseEngineering/comments/rqety/rreverseengineerings_q2_2012_hiring_thread/
1309339419.041community.websense.comic5t6Blackhat Google SEO Poisoning of keyword 'patti labelle'_pusher_4430http://www.reddit.com/r/ReverseEngineering/comments/ic5t6/blackhat_google_seo_poisoning_of_keyword_patti/Falset5_2qmd0FalseFalset3_ic5t6http://community.websense.com/blogs/securitylabs/archive/2011/06/28/blackhat-google-seo-poisoning-of-keyword-quot-patti-labelle-quot.aspx
1308126912.038codetastrophe.comi05ojIntro to x64 Reversing [PDF]rolfr4355http://www.reddit.com/r/ReverseEngineering/comments/i05oj/intro_to_x64_reversing_pdf/Falset5_2qmd0FalseFalset3_i05ojhttp://codetastrophe.com/SummerCon%202011%20-%20Intro%20to%20x64%20Reversing.pdf
1301935661.040d0cs4vage.blogspot.comgifaoInteresting Behaviors in x86 Instructions 4225http://www.reddit.com/r/ReverseEngineering/comments/gifao/interesting_behaviors_in_x86_instructions/Falset5_2qmd0FalseFalset3_gifaohttp://d0cs4vage.blogspot.com/2011/04/interesting-behaviors-in-x86.html
1293786893.040engadget.comeu3qzPS3 private cryptography key obtainedethicszen4449http://www.reddit.com/r/ReverseEngineering/comments/eu3qz/ps3_private_cryptography_key_obtained/Falset5_2qmd0FalseFalset3_eu3qzhttp://www.engadget.com/2010/12/29/hackers-obtain-ps3-private-cryptography-key-due-to-epic-programm/
1367633635.037skullsecurity.org1dnok3Epic 'cnot' Writeup (highest value level from PlaidCTF)rolfr49121http://www.reddit.com/r/ReverseEngineering/comments/1dnok3/epic_cnot_writeup_highest_value_level_from/Falset5_2qmd0FalseFalset3_1dnok3http://www.skullsecurity.org/blog/2013/epic-cnot-writeup-plaidctf
1363097553.042inertiawar.com1a5bl4Notes on Intel Microcode Updatessimpleuser4422http://www.reddit.com/r/ReverseEngineering/comments/1a5bl4/notes_on_intel_microcode_updates/Falset5_2qmd0FalseFalset3_1a5bl4http://inertiawar.com/microcode/
1353512010.038ollydbg.de13khtuOllyDbg v2.01 beta, updated 4x -- a major update of the plugin interface.g0dmoney4793http://www.reddit.com/r/ReverseEngineering/comments/13khtu/ollydbg_v201_beta_updated_4x_a_major_update_of/Falset5_2qmd0FalseFalset3_13khtuhttp://www.ollydbg.de/version2.html
1347647898.040thelegendofrandom.comzw0g2Tutorial on anti-debugging techniquesRandomNetzley61213http://www.reddit.com/r/ReverseEngineering/comments/zw0g2/tutorial_on_antidebugging_techniques/Falset5_2qmd0FalseFalset3_zw0g2http://thelegendofrandom.com/blog/archives/2100
1347384506.040ownedcore.comzpus0All the buzz about tracking and privacy concerns aside, the top post of /r/Games offers a nice read about reverse-engineering a watermark function inside the WoW Game ClientRoLoLoLoLo51112http://www.reddit.com/r/ReverseEngineering/comments/zpus0/all_the_buzz_about_tracking_and_privacy_concerns/Falset5_2qmd0FalseFalset3_zpus0http://www.ownedcore.com/forums/world-of-warcraft/world-of-warcraft-general/375573-looking-inside-your-screenshots.html
1324752359.044fabiensanglard.netnpc71'Out Of This World' Code Reviewrolfr58141http://www.reddit.com/r/ReverseEngineering/comments/npc71/out_of_this_world_code_review/Falset5_2qmd0FalseFalset3_npc71http://fabiensanglard.net/anotherWorld_code_review/index.php
1323005506.041self.ReverseEngineeringmzq1dEducationOpenSecurityTraining50915http://www.reddit.com/r/ReverseEngineering/comments/mzq1d/education/If you're someone who already has a reasonable grasp of reverse engineering and malware analysis, I need your help. I need you to help train more people like yourself.More likely than not you're 'self-taught'. Except, when you were teaching yourself you were probably actually relying in large part on the help of others. They freely posted zines, articles, and blog entries. They and answered questions in forums, email lists, and in person. Eventually, once you were confident enough to believe you would be right more often than wrong, you might have tried to pay it forward and share your knowledge back to others.If so, you're the type of person who is needed. We need people who want to make an impact by more rapidly helping educate those who want to learn. We all know that things like certifications and most college curriculums set a fairly low bar for the expectation of what people should know for security. Certainly in the area of reverse engineering there is almost nothing. Paid training classes can be good, but the cost can prevent people from getting all the training they really need.I believe what's needed are many more people teaching trainings in person, while encouraging their top students to eventually also become instructors. This brings down costs, provides a well-structured learning environment with instant feedback, and results in the education of many more people. If you're a person who already knows the material, becoming an instructor should be a snap. All you need are class materials, and a venue. Finding venues is up to the instructors, but now there is a place that lesson plans and class materials can be stored:www.OpenSecurityTraining.infoThis site is meant to act as a repository for class material that have been used in computer security classes at least a day long. The material must be released under an open license to allow the most possible instructors to utilize and adapt the material. It can then be used by new instructors as-is, or piecemeal to enhance or speed the creation of other classes. I didn't want to widely promote the site until we had enough seed content, and now I think we're there.But we need more content, and more instructors. If you have classes on any security subject that you currently or have previously taught, and you would like others to use the material, please consider contributing it. And if you're one of the people who already knows a great deal of the material currently posted there, please start thinking about how you could take the material and start teaching others in person, at your job, at conferences, or elsewhere. For more about why you should contribute, and why you should teach, please read this page: www.OpenSecurityTraining.info/Why.htmlThanksXeno KovahFalset5_2qmd0TrueTruet3_mzq1dhttp://www.reddit.com/r/ReverseEngineering/comments/mzq1d/education/
1320174239.040self.ReverseEngineeringlwqbnHow do programmers create add-ons for games like League of Legends that don't expose an API?TheMagicHorsey49911http://www.reddit.com/r/ReverseEngineering/comments/lwqbn/how_do_programmers_create_addons_for_games_like/The makers of League of Legends did not ship the game with a replay recorder or playback mechanism, but some fans wrote their own system for the game. How do programmers figure out where/how to interface with a game like that which doesn't publish an API?Do these programmers just sniff the packets that the game produces/receives to figure out what is going on? What if these packets are obfuscated? Or do they directly examine the memory image of the game as it is running?What tools would you use for such analysis?Falset5_2qmd0FalseTruet3_lwqbnhttp://www.reddit.com/r/ReverseEngineering/comments/lwqbn/how_do_programmers_create_addons_for_games_like/
1300209145.041symantec.comg4it0Backdoor.Prioxer!inf: “accidentally” the stealthiest file infector ever!gnewman4432http://www.reddit.com/r/ReverseEngineering/comments/g4it0/backdoorprioxerinf_accidentally_the_stealthiest/Falset5_2qmd0FalseFalset3_g4it0http://www.symantec.com/connect/blogs/backdoorprioxerinf-accidentally-stealthiest-file-infector-ever
1285644322.039blog.kotowicz.netdjt1v'Hottest girls on facebook' malware analysisNinjaYoda4782http://www.reddit.com/r/ReverseEngineering/comments/djt1v/hottest_girls_on_facebook_malware_analysis/Falset5_2qmd0FalseFalset3_djt1vhttp://blog.kotowicz.net/2010/09/hottest-girls-on-facebook-everoniacom.html
1344858018.036securityxploded.comy526iFree Reverse Engineering Course on SecurityXploded websitemakash47113http://www.reddit.com/r/ReverseEngineering/comments/y526i/free_reverse_engineering_course_on/Falset5_2qmd0FalseFalset3_y526ihttp://securityxploded.com/security-training.php
1341008649.040thelegendofrandom.comvtfeaR4ndom's 10th tutorial on beginning reverse engineeringRandomNetzley56163http://www.reddit.com/r/ReverseEngineering/comments/vtfea/r4ndoms_10th_tutorial_on_beginning_reverse/Falset5_2qmd0FalseFalset3_vtfeahttp://thelegendofrandom.com/blog/archives/833
1340152974.037washingtonpost.comvay3iWelcome to computer security: U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials sayrolfr531626http://www.reddit.com/r/ReverseEngineering/comments/vay3i/welcome_to_computer_security_us_israel_developed/Falset5_2qmd0FalseFalset3_vay3ihttp://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story_1.html
1336462707.037amazon.comtcmt2iOS Hacker's Handbook released todayrolfr481116http://www.reddit.com/r/ReverseEngineering/comments/tcmt2/ios_hackers_handbook_released_today/Falset5_2qmd0FalseFalset3_tcmt2http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123/
1315315409.042net.cs.uni-bonn.dek6dpm[pdf] very nice and simple opcode tablesimpleuser4642http://www.reddit.com/r/ReverseEngineering/comments/k6dpm/pdf_very_nice_and_simple_opcode_table/Falset5_2qmd0FalseFalset3_k6dpmhttp://net.cs.uni-bonn.de/fileadmin/user_upload/plohmann/x86_opcode_structure_and_instruction_overview.pdf
1309302502.039romhacking.netibrcjThe Art of ROM Hackingpolsab4452http://www.reddit.com/r/ReverseEngineering/comments/ibrcj/the_art_of_rom_hacking/Falset5_2qmd0FalseFalset3_ibrcjhttp://www.romhacking.net/docs/AoRH.html
1295427354.039twitter.comf508eReverse-engineering.net has been forced to get closed.silkut4567http://www.reddit.com/r/ReverseEngineering/comments/f508e/reverseengineeringnet_has_been_forced_to_get/Falset5_2qmd0FalseFalset3_f508ehttp://twitter.com/guillaumejuret/status/27649500893937665
1295024762.038blogs.msdn.comf2b4wMy, what strange NOPs you have!4241http://www.reddit.com/r/ReverseEngineering/comments/f2b4w/my_what_strange_nops_you_have/Falset5_2qmd0FalseFalset3_f2b4whttp://blogs.msdn.com/b/oldnewthing/archive/2011/01/12/10114521.aspx
1291041479.037pastebin.comedbyyantiflag.sys - Writing a kernel driver to remove the LLKHF_INJECTED flagusualsuspect4254http://www.reddit.com/r/ReverseEngineering/comments/edbyy/antiflagsys_writing_a_kernel_driver_to_remove_the/Falset5_2qmd0FalseFalset3_edbyyhttp://pastebin.com/rj4YcW4C
1290292592.037ollydbg.dee99leOllyDbg 2.01 (intermediate alpha) released - and OllyDbg 64 announcedwtbw43621http://www.reddit.com/r/ReverseEngineering/comments/e99le/ollydbg_201_intermediate_alpha_released_and/Falset5_2qmd0FalseFalset3_e99lehttp://ollydbg.de/version2.html?v=2.01
1289208901.041redmine.corelan.bee2usjCorelan Team exploit development cheatsheet wallpapersanitybit4324http://www.reddit.com/r/ReverseEngineering/comments/e2usj/corelan_team_exploit_development_cheatsheet/Falset5_2qmd0FalseFalset3_e2usjhttp://redmine.corelan.be:8800/attachments/download/59/corelan_wallpaper_dark.jpg
1286532902.035codef00.comdohonLinux debugger inspired by OllyDbgmebrahim41614http://www.reddit.com/r/ReverseEngineering/comments/dohon/linux_debugger_inspired_by_ollydbg/Falset5_2qmd0FalseFalset3_dohonhttp://www.codef00.com/projects.php#debugger
1374613560.037youtube.com1iwsh1Baggage X-ray machinekasbah4255http://www.reddit.com/r/ReverseEngineering/comments/1iwsh1/baggage_xray_machine/Falset5_2qmd0FalseFalset3_1iwsh1http://www.youtube.com/watch?v=Qjw0NDeP-0Q
1374351024.034research.microsoft.com1ipmyzDiscoverer: Automatic Protocol Reverse Engineering from Network Tracesdgryski4066http://www.reddit.com/r/ReverseEngineering/comments/1ipmyz/discoverer_automatic_protocol_reverse_engineering/Falset5_2qmd0FalseFalset3_1ipmyzhttps://research.microsoft.com/apps/pubs/default.aspx?id=153196
1368636838.038chrisalley.com1ee43gThe Bieber Algorithmcalley479501214http://www.reddit.com/r/ReverseEngineering/comments/1ee43g/the_bieber_algorithm/Falset5_2qmd0FalseFalset3_1ee43ghttp://chrisalley.com/tech-support/the-bieber-algorithm/
1355419888.038code.google.com14sl35a valid ELF/PDF/HTML/Java filesimpleuser52144http://www.reddit.com/r/ReverseEngineering/comments/14sl35/a_valid_elfpdfhtmljava_file/Falset5_2qmd0FalseFalset3_14sl35http://code.google.com/p/corkami/downloads/detail?name=CorkaMInuX.zip
1346789745.038thelegendofrandom.comzcpvyTutorial: Cracking Visual Basic BinariesRandomNetzley58203http://www.reddit.com/r/ReverseEngineering/comments/zcpvy/tutorial_cracking_visual_basic_binaries/Falset5_2qmd0FalseFalset3_zcpvyhttp://thelegendofrandom.com/blog/archives/1947
1333994221.037zhodiac.hispahack.coms13v2CVE-2012-0769: the case of the perfect info leak [PDF]polsab4690http://www.reddit.com/r/ReverseEngineering/comments/s13v2/cve20120769_the_case_of_the_perfect_info_leak_pdf/Falset5_2qmd0FalseFalset3_s13v2http://zhodiac.hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf
1332383188.038forbes.comr7rj3Not technical, but worth reading -- Meet The Hackers Who Sell Spies The Tools To Crack Your PC (And Get Paid Six-Figure Fees)rolfr521410http://www.reddit.com/r/ReverseEngineering/comments/r7rj3/not_technical_but_worth_reading_meet_the_hackers/Falset5_2qmd0FalseFalset3_r7rj3http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-fees/
1321461796.037self.ReverseEngineeringmeixtBest Tutorials for learning how to crack in 2011.excidius44737http://www.reddit.com/r/ReverseEngineering/comments/meixt/best_tutorials_for_learning_how_to_crack_in_2011/Can any of you recommend some up-to-date tutorials to help some of us get started?Falset5_2qmd0FalseTruet3_meixthttp://www.reddit.com/r/ReverseEngineering/comments/meixt/best_tutorials_for_learning_how_to_crack_in_2011/
1311025958.040esec-lab.sogeti.comit7juAnalysis of the jailbreakme v3 font exploitpolsab4331http://www.reddit.com/r/ReverseEngineering/comments/it7ju/analysis_of_the_jailbreakme_v3_font_exploit/Falset5_2qmd0FalseFalset3_it7juhttp://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit
1292323951.036ossmann.blogspot.comelkgpA pink $16 pocket spectrum analyzerethicszen4370http://www.reddit.com/r/ReverseEngineering/comments/elkgp/a_pink_16_pocket_spectrum_analyzer/Falset5_2qmd0FalseFalset3_elkgphttp://ossmann.blogspot.com/2010/03/16-pocket-spectrum-analyzer.html
1250129929.040self.ReverseEngineering9a50jIntroduction to modern reverse engineering?45512http://www.reddit.com/r/ReverseEngineering/comments/9a50j/introduction_to_modern_reverse_engineering/Hi all,I'm currently studying Computer Science and I've always known about debugging (but on a simple level).I've been reading a lot about reverse engineering lately because I know almost nothing about software protection schemes and would like to know how they work, how to build my own (etc) and how to defeat them.After doing research (even if small amounts), I haven't been able to find many resources that are modern (except for a few books which I plan to get). I realize assembly language is the standard, and I'm attempting to understand as much of it as I can, but would like to know if any of you have suggestions or resources I should check out in order to get into this field.P.S. For the record, the only 'real' programming language I have experience in thus far is C, although I've fiddled with Python and a few scripting languages.Falset5_2qmd0FalseTruet3_9a50jhttp://www.reddit.com/r/ReverseEngineering/comments/9a50j/introduction_to_modern_reverse_engineering/
1375314897.038github.com1jgi90VideoCore IV Programmers Manual (Raspberry Pi)hermanhermitage4686http://www.reddit.com/r/ReverseEngineering/comments/1jgi90/videocore_iv_programmers_manual_raspberry_pi/Falset5_2qmd0FalseFalset3_1jgi90https://github.com/hermanhermitage/videocoreiv/wiki/VideoCore-IV-Programmers-Manual
1372175568.033acloudtree.com1h1kpvHacking Java Bytecode for Programmers (Part4)1107d74292http://www.reddit.com/r/ReverseEngineering/comments/1h1kpv/hacking_java_bytecode_for_programmers_part4/Falset5_2qmd0FalseFalset3_1h1kpvhttp://www.acloudtree.com/hacking-java-bytecode-for-programmers-part4-krakatau-and-the-case-of-the-integer-overflow/
1368572606.034cydiasubstrate.com1echezAndroid Substrate (by Saurik)sablefoxx44100http://www.reddit.com/r/ReverseEngineering/comments/1echez/android_substrate_by_saurik/Falset5_2qmd0FalseFalset3_1echezhttp://www.cydiasubstrate.com/
1366986890.035delogrand.blogspot.fi1d5lorExtracting cached TrueCrypt passphrase using Volatilityx909044911http://www.reddit.com/r/ReverseEngineering/comments/1d5lor/extracting_cached_truecrypt_passphrase_using/Falset5_2qmd0FalseFalset3_1d5lorhttp://delogrand.blogspot.fi/2013/04/cyber-defense-exercise-2013-extracting.html
1353054333.037joxeankoret.com13ah30Patching old Linux binaries to work with recent libc versionsrolfr4252http://www.reddit.com/r/ReverseEngineering/comments/13ah30/patching_old_linux_binaries_to_work_with_recent/Falset5_2qmd0FalseFalset3_13ah30http://joxeankoret.com/blog/2012/11/14/patching-old-linux-binaries-to-work-with-recent-libc-versions/
1349948754.035forum.xda-developers.com11aw7rEasily decompile an APK to Java code50153http://www.reddit.com/r/ReverseEngineering/comments/11aw7r/easily_decompile_an_apk_to_java_code/Falset5_2qmd0FalseFalset3_11aw7rhttp://forum.xda-developers.com/showthread.php?t=1910873
1341317306.039reddit.comvz3v6Here's another subreddit for a bit more hands-on reverse engineering. (/r/uic/)fsdfsdfsdfsdfsdfsdpf43410http://www.reddit.com/r/ReverseEngineering/comments/vz3v6/heres_another_subreddit_for_a_bit_more_handson/Falset5_2qmd0FalseFalset3_vz3v6http://www.reddit.com/r/uic
1338391264.037jbremer.orguc769Abusing Forced Inline in CHectaMan4146http://www.reddit.com/r/ReverseEngineering/comments/uc769/abusing_forced_inline_in_c/Falset5_2qmd0FalseFalset3_uc769http://jbremer.org/abusing-forced-inline-in-c/
1316712007.039synalysis.netko38rSynalyze It! Hex-editor, allows you to create a grammar for binary files interactively..g0dmoney45610http://www.reddit.com/r/ReverseEngineering/comments/ko38r/synalyze_it_hexeditor_allows_you_to_create_a/Falset5_2qmd0FalseFalset3_ko38rhttp://www.synalysis.net/
1315402448.036research.microsoft.comk7kdl2856 videos from Microsoft Research available onlineigor_sk48126http://www.reddit.com/r/ReverseEngineering/comments/k7kdl/2856_videos_from_microsoft_research_available/Falset5_2qmd0FalseFalset3_k7kdlhttp://research.microsoft.com/apps/dp/vi/videos.aspx
1310015508.039dsecrg.comiirrxPython arsenal for Reverse Engineering [PDF]polsab4340http://www.reddit.com/r/ReverseEngineering/comments/iirrx/python_arsenal_for_reverse_engineering_pdf/Falset5_2qmd0FalseFalset3_iirrxhttp://dsecrg.com/files/pub/pdf/Python%20arsenal%20for%20RE.pdf
1308686752.038windbg.infoi5jhvWinDbg From A to Z!polsab4243http://www.reddit.com/r/ReverseEngineering/comments/i5jhv/windbg_from_a_to_z/Falset5_2qmd0FalseFalset3_i5jhvhttp://windbg.info/doc/2-windbg-a-z.html
1294609493.039youtube.comez548You Should Work for Symantecrolfr4785http://www.reddit.com/r/ReverseEngineering/comments/ez548/you_should_work_for_symantec/Falset5_2qmd0FalseFalset3_ez548http://www.youtube.com/watch?v=pzcLTPy8yDQ
1289912125.036accessomat.wordpress.come6xgrx86 assembler is not injectiveaccessomat4377http://www.reddit.com/r/ReverseEngineering/comments/e6xgr/x86_assembler_is_not_injective/Falset5_2qmd0FalseFalset3_e6xgrhttp://accessomat.wordpress.com/2010/11/08/x86-assembler-is-not-injective/
1285923258.037symantec.comdlexaSymantec W32.Stuxnet Dossier [PDF]sanitybit40319http://www.reddit.com/r/ReverseEngineering/comments/dlexa/symantec_w32stuxnet_dossier_pdf/Falset5_2qmd0FalseFalset3_dlexahttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
1374746777.038youtube.com1j0p4eRigol DS2000 and DS4000 partially hacked! The Key generation algorithm has been reverse-engineered!derpiderpiton43512http://www.reddit.com/r/ReverseEngineering/comments/1j0p4e/rigol_ds2000_and_ds4000_partially_hacked_the_key/Falset5_2qmd0FalseFalset3_1j0p4ehttps://www.youtube.com/watch?v=-Woslp7HXFM
1367395021.033syscalls.kernelgrok.com1dgy5cLinux Syscall ReferenceTrout_Tickler4292http://www.reddit.com/r/ReverseEngineering/comments/1dgy5c/linux_syscall_reference/Falset5_2qmd0FalseFalset3_1dgy5chttp://syscalls.kernelgrok.com/
1360245345.040skilldrick.github.com182bf5Easy 6502 nullandnull4774http://www.reddit.com/r/ReverseEngineering/comments/182bf5/easy_6502/Falset5_2qmd0FalseFalset3_182bf5http://skilldrick.github.com/easy6502/
1358111592.0330xebfe.net16id2tHow to create an anonymous IDA PRO database0x0000EBFE51184http://www.reddit.com/r/ReverseEngineering/comments/16id2t/how_to_create_an_anonymous_ida_pro_database/Falset5_2qmd0FalseFalset3_16id2thttp://www.0xebfe.net/blog/2013/01/13/how-to-create-an-anonymous-ida-pro-database-dot-idb/
1357271624.038self.ReverseEngineering15xiq2Beginning Reverse Engineering?flareboy323511335http://www.reddit.com/r/ReverseEngineering/comments/15xiq2/beginning_reverse_engineering/I had a question about reverse engineering. I've been interested in it for an extremely long time, but never have found a way to get into it. For things like cracking programs and stuff, and even for simple stuff like creating game mods, or finding out how the game works (All of it's textures and all of that type of stuff).The only tutorials I can find online are extremely old and un-helpful, things like 'Open the exe file in IDA and search for the string blablabla, and then just change it!' or things that haven't worked since the 90s.Because of the fact that I can't find any college classes on this or anything else like that, I haven't been able to find a place to learn Reverse Engineering. Would anyone here be able to help me?Thanks a ton!Falset5_2qmd0FalseTruet3_15xiq2http://www.reddit.com/r/ReverseEngineering/comments/15xiq2/beginning_reverse_engineering/
1341229960.036jbremer.orgvx57yx86 API Hooking Demystifiedjbremer3931http://www.reddit.com/r/ReverseEngineering/comments/vx57y/x86_api_hooking_demystified/Falset5_2qmd0FalseFalset3_vx57yhttp://jbremer.org/x86-api-hooking-demystified/
1330387544.038blog.chromium.orgq8vazGoogle offers $1 million for Chrome exploitsdarkry48107http://www.reddit.com/r/ReverseEngineering/comments/q8vaz/google_offers_1_million_for_chrome_exploits/Falset5_2qmd0FalseFalset3_q8vazhttp://blog.chromium.org/2012/02/pwnium-rewards-for-exploits.html
1327010516.038ngssecure.comonvz7Frisbee Lite: a USB fuzzing tooligor_sk4131http://www.reddit.com/r/ReverseEngineering/comments/onvz7/frisbee_lite_a_usb_fuzzing_tool/Falset5_2qmd0FalseFalset3_onvz7http://www.ngssecure.com/research/infiltrate.aspx
1323029623.036gchqchallenge.blogspot.comn020vGCHQ CanYouCrackIt Solution explainedkarmakit44810http://www.reddit.com/r/ReverseEngineering/comments/n020v/gchq_canyoucrackit_solution_explained/Falset5_2qmd0FalseFalset3_n020vhttp://gchqchallenge.blogspot.com/
1321812028.039bsr43.free.frmj5qjHopper, an IDA-ish disassembler for OSX (it does Windows binaries!)abadidea48911http://www.reddit.com/r/ReverseEngineering/comments/mj5qj/hopper_an_idaish_disassembler_for_osx_it_does/Falset5_2qmd0FalseFalset3_mj5qjhttp://bsr43.free.fr/Hopper/Home.html
1319833436.037phoronix.comlsklaSkype Goes After Reverse-Engineering5d41402abc4b2a76b9714475http://www.reddit.com/r/ReverseEngineering/comments/lskla/skype_goes_after_reverseengineering/Falset5_2qmd0FalseFalset3_lsklahttp://www.phoronix.com/scan.php?page=news_item&px=MTAwNzI
1311896694.033processingjs.nihongoresources.comj2oz1Hacking TTF: the smallest fontigor_sk4293http://www.reddit.com/r/ReverseEngineering/comments/j2oz1/hacking_ttf_the_smallest_font/Falset5_2qmd0FalseFalset3_j2oz1http://processingjs.nihongoresources.com/the_smallest_font/
1289261634.036self.ReverseEngineeringe36okAdministrivia: /r/ReverseEngineering has reached 5,000 subscribersrolfr41514http://www.reddit.com/r/ReverseEngineering/comments/e36ok/administrivia_rreverseengineering_has_reached/The number's only significance is that 5,000 people simultaneously have reddit accounts and decided to subscribe to /r/ReverseEngineering. There's no indication of how many of those accounts are 'regularly active', nor of the number of people who lurk without creating an account. However, according to reddit's traffic statistics, we've had about 5,000 and 5,500 'unique' visitors in the past two months, respectively, and 33,000 and 37,000 total page views in each of the same, respective months.As usual, I'd like to thank the contributors, the readers, and the moderators. Please keep the contributions coming; also, if you have any requests, questions, or suggestions regarding the content, this is a good thread in which to raise them.Falset5_2qmd0FalseTruet3_e36okhttp://www.reddit.com/r/ReverseEngineering/comments/e36ok/administrivia_rreverseengineering_has_reached/moderator
1366071408.035utdallas.edu1cfddgRewriting x86 Binaries Without Code Producer Cooperation [PDF, Ph.D. thesis]rolfr4166http://www.reddit.com/r/ReverseEngineering/comments/1cfddg/rewriting_x86_binaries_without_code_producer/Falset5_2qmd0FalseFalset3_1cfddghttps://www.utdallas.edu/~kxh060100/wartell12thesis.pdf
1355133039.035j00ru.vexillium.org14ljdzDefeating Windows Driver Signature Enforcement #3: The Ultimate Encounter j00ru//vx tech blogniko-r4270http://www.reddit.com/r/ReverseEngineering/comments/14ljdz/defeating_windows_driver_signature_enforcement_3/Falset5_2qmd0FalseFalset3_14ljdzhttp://j00ru.vexillium.org/?p=1455
1351280978.039ps3hax.net1251vwPS3: dumping the bootldrigor_sk4230http://www.reddit.com/r/ReverseEngineering/comments/1251vw/ps3_dumping_the_bootldr/Falset5_2qmd0FalseFalset3_1251vwhttp://www.ps3hax.net/showthread.php?p=459578
1345311064.038ollydbg.deyfo51OllyDbg 2.01 beta2newgre49115http://www.reddit.com/r/ReverseEngineering/comments/yfo51/ollydbg_201_beta2/Falset5_2qmd0FalseFalset3_yfo51http://www.ollydbg.de/version2.html?
1341252212.034self.ReverseEngineeringvxmzr/r/ReverseEngineering's Q3 2012 Hiring Threadrolfr461224http://www.reddit.com/r/ReverseEngineering/comments/vxmzr/rreverseengineerings_q3_2012_hiring_thread/If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s).Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/RolfRolles/status/219854070645661696) couldn't hurt.Falset5_2qmd0FalseTruet3_vxmzrhttp://www.reddit.com/r/ReverseEngineering/comments/vxmzr/rreverseengineerings_q3_2012_hiring_thread/
1339448947.037trailofbits.files.wordpress.comuwri7Analyzing the MD5 collision in Flame [pdf]simpleuser3922http://www.reddit.com/r/ReverseEngineering/comments/uwri7/analyzing_the_md5_collision_in_flame_pdf/Falset5_2qmd0FalseFalset3_uwri7http://trailofbits.files.wordpress.com/2012/06/flame-md5.pdf
1330486937.036chrisfenton.comqarv6Help recover the last release of Cray OSigor_sk491311http://www.reddit.com/r/ReverseEngineering/comments/qarv6/help_recover_the_last_release_of_cray_os/Falset5_2qmd0FalseFalset3_qarv6http://chrisfenton.com/cos-recovery/
1323723281.031reversemode.comna1x6Reversing Industrial firmware for fun and backdoors Irolfr41102http://www.reddit.com/r/ReverseEngineering/comments/na1x6/reversing_industrial_firmware_for_fun_and/Falset5_2qmd0FalseFalset3_na1x6http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1
1322070534.037cs.gmu.edummx9oCS640 - Advanced Compilersdigduggg4366http://www.reddit.com/r/ReverseEngineering/comments/mmx9o/cs640_advanced_compilers/Falset5_2qmd0FalseFalset3_mmx9ohttp://cs.gmu.edu/~white/CS640/
1318705754.037code.google.comlddiwthe Portable Executable Format on Windows (binaries included)simpleuser4140http://www.reddit.com/r/ReverseEngineering/comments/lddiw/the_portable_executable_format_on_windows/Falset5_2qmd0FalseFalset3_lddiwhttp://code.google.com/p/corkami/wiki/PE
1294731155.036reverse-engineering.netf038lWhere to start in Reverse Engineering?digduggg41514http://www.reddit.com/r/ReverseEngineering/comments/f038l/where_to_start_in_reverse_engineering/Falset5_2qmd0FalseFalset3_f038lhttp://www.reverse-engineering.net/viewtopic.php?f=56&t=4605&sid=63d0b4a7052ceca6fd966ab581530d6c
1243430709.033gynvael.coldwind.pl8nm7uArt of file - graphical interpretation of a filecloudburst3745http://www.reddit.com/r/ReverseEngineering/comments/8nm7u/art_of_file_graphical_interpretation_of_a_file/Falset5_2qmd0FalseFalset3_8nm7uhttp://gynvael.coldwind.pl/?id=199
1352036412.036joxeankoret.com12m06aA simple PIN tool unpacker for the Linux version of Skypejoxeankoret4371http://www.reddit.com/r/ReverseEngineering/comments/12m06a/a_simple_pin_tool_unpacker_for_the_linux_version/Falset5_2qmd0FalseFalset3_12m06ahttp://joxeankoret.com/blog/2012/11/04/a-simple-pin-tool-unpacker-for-the-linux-version-of-skype/
1350949110.034imrannazar.com11wsp7GameBoy Emulation in JavaScriptnullandnull46123http://www.reddit.com/r/ReverseEngineering/comments/11wsp7/gameboy_emulation_in_javascript/Falset5_2qmd0FalseFalset3_11wsp7http://imrannazar.com/GameBoy-Emulation-in-JavaScript:-The-CPU
1350512932.033securitytube.net11nlsjSecuritytube Gnu Debugger Expert (SGDE) Course Videos jwcrux3741http://www.reddit.com/r/ReverseEngineering/comments/11nlsj/securitytube_gnu_debugger_expert_sgde_course/Falset5_2qmd0FalseFalset3_11nlsjhttp://www.securitytube.net/tags/sgde
1347907773.035self.ReverseEngineering101a5gIntroducing /r/RELounge, a subreddit for the non-technical side of reverse engineering and computer securityrolfr4160http://www.reddit.com/r/ReverseEngineering/comments/101a5g/introducing_rrelounge_a_subreddit_for_the/I started /r/ReverseEngineering for the purpose of disseminating highly technical information: reverse engineering workproducts, tools, academic PDFs on the subject of advanced reverse engineering tool construction, etc. But as time has progressed, things related to reverse engineering have been cropping up in other sources. For example, these days there are often high-profile exposés in venues such as the New York Times about state-sponsored malware; sometimes a member of the security community has his or her (who am I kidding, his) research detailed in mainstream media sources; our industry might be the subject of political discussions, e.g. whether exploit sales should be regulated; and so on. I hesitate to post these articles to /r/ReverseEngineering due to my desire to maintain the technical focus of that subreddit, but at the same time I feel as though subjects like these may be interesting to readers of /r/ReverseEngineering.Therefore, the solution to this problem is to create a new subreddit specifically devoted to the 'non-technical' side of reverse engineering. Hence I introduce [/r/RELounge](http://www.reddit.com/r/RELounge). The charter for this subreddit is fairly nebulous. If it's in the mainstream media, post it to RELounge. If it's 'technical', but does not involve assembly language, low-level system programming, compiler internals, or mathematics (for example, writeups from the anti-virus industry which don't involve any binary analysis), post it to /r/RELounge.For people who like to read /r/ReverseEngineering in either '[new](http://www.reddit.com/r/ReverseEngineering/new)' mode (i.e., only seeing the most recent submissions) or '[comment](http://www.reddit.com/r/ReverseEngineering/comments)' mode (i.e., viewing only the most recent comments), you can continue doing this for both subreddits at the same time with these combined [new](http://www.reddit.com/r/RELounge+ReverseEngineering/new) and [comment](http://www.reddit.com/r/RELounge+ReverseEngineering/comments) links.Thanks for your attention and I hope /r/RELounge can become as worthwhile a destination as /r/ReverseEngineering.RolfFalset5_2qmd0FalseTruet3_101a5ghttp://www.reddit.com/r/ReverseEngineering/comments/101a5g/introducing_rrelounge_a_subreddit_for_the/moderator
1342730040.034thelegendofrandom.comwu3wzR4ndoms fifteenth tutorial on reverse engineeringRandomNetzley52182http://www.reddit.com/r/ReverseEngineering/comments/wu3wz/r4ndoms_fifteenth_tutorial_on_reverse_engineering/Falset5_2qmd0FalseFalset3_wu3wzhttp://thelegendofrandom.com/blog/archives/1093
1336141792.033phreakocious.nett6v76Python program for reverse engineering/analysis of binary protocols. Helps to identify where the locations of fields and their data types.phreakocious37414http://www.reddit.com/r/ReverseEngineering/comments/t6v76/python_program_for_reverse_engineeringanalysis_of/Falset5_2qmd0FalseFalset3_t6v76http://phreakocious.net/PI/
1332953718.034self.ReverseEngineeringrhrghReverse engineering the .ypk file format. Why are the PNGs coming out scrambled?SKCIDLOL41720http://www.reddit.com/r/ReverseEngineering/comments/rhrgh/reverse_engineering_the_ypk_file_format_why_are/I am trying to reverse engineer the .ypk file format used in Yu-Gi-Oh! ONLINE 3 in order to extract some PNG images from it. I thought I had it figured out but the images are coming out scrambled. Is there some kind of encryption or compression at fault here?Here's a sample of the binary file which contains two images. This is an identical copy of the first 211,649 bytes of data001.ypk.[Test.bin](http://www.mediafire.com/?wbdlc0l5wl64666)This is what the images look like when I extract them.[Image 1 - 0000.png](http://i.imgur.com/N2Ke1.png)[Image 2 - 3900_1.png](http://i.imgur.com/hIVYx.png)Each image has a variable sized header before it. This is what I've worked out, but I'm unsure of its veracity. 10 bytes constant, unknown 08 bytes variable, unknown 04 bytes (dword), Image data size + 5 04 bytes (dword), Image data size - 15 02 bytes (word), Length of image name 02 bytes (word), Offset of image data from end of file name - 5P.S. I originally posted this on r/learnprogramming, but someone suggested I post it here.~~~EDIT: More Image samples to show the variety of the corruption. In case it isn't clear, most all of the areas that appear white are fully transparent.[4185_1.png](http://i.imgur.com/xsWzd.png)[4243_1.png](http://i.imgur.com/OspQn.png)[4527_1.png](http://i.imgur.com/jeaQy.png)[4727_1.png](http://i.imgur.com/68NZZ.png)If you're willing to download and install the game the whole 503MB binary file is located at 'C:Program FilesKonamiYu-Gi-Oh! ONLINE 3packagedata001.ypk'. A login is required to play, but not to download and install.[This is the game installer](http://dlg.ygopkg.konamionline.com/ygopkg/yo3setup_20110728en.exe)~~~Solved: mmm_tacos has pointed out that these .ypk files are slightly modified [PKZIP](http://www.pkware.com/documents/casestudies/APPNOTE.TXT) [files](http://petlibrary.tripod.com/ZIP.HTM). With this knowledge the images inside can be successfully extracted with no corruption.Thanks to everyone that took the time to reply.Falset5_2qmd0TrueTruet3_rhrghhttp://www.reddit.com/r/ReverseEngineering/comments/rhrgh/reverse_engineering_the_ypk_file_format_why_are/
1330175710.033opcodes.corkami.comq5epfOpcodes' tables (instruction sets maps) of Android, Java, .Net, x86, x64simpleuser4292http://www.reddit.com/r/ReverseEngineering/comments/q5epf/opcodes_tables_instruction_sets_maps_of_android/Falset5_2qmd0FalseFalset3_q5epfhttp://opcodes.corkami.com
1325017325.03228c3.fem-net.densmzv28c3 Live Video Streamsdigduggg3973http://www.reddit.com/r/ReverseEngineering/comments/nsmzv/28c3_live_video_streams/Falset5_2qmd0FalseFalset3_nsmzvhttp://28c3.fem-net.de/
1318796983.031pentest.cryptocity.netled1pAlex Sotirov's Intro to Static Reversingdguido4096http://www.reddit.com/r/ReverseEngineering/comments/led1p/alex_sotirovs_intro_to_static_reversing/Falset5_2qmd0FalseFalset3_led1phttp://pentest.cryptocity.net/reverse-engineering/reverse-engineering-101.html
1316332585.036eggwall.comkjdk4Android & ARM - and 8 part assembly walkthroughwishi4372http://www.reddit.com/r/ReverseEngineering/comments/kjdk4/android_arm_and_8_part_assembly_walkthrough/Falset5_2qmd0FalseFalset3_kjdk4http://www.eggwall.com/2011/09/android-arm-assembly-calling-assembly.html
1312945247.036fgiesen.wordpress.comje6rzx86 code compression in kkrunchyrolfr3933http://www.reddit.com/r/ReverseEngineering/comments/je6rz/x86_code_compression_in_kkrunchy/Falset5_2qmd0FalseFalset3_je6rzhttp://fgiesen.wordpress.com/2011/01/24/x86-code-compression-in-kkrunchy/
1311689446.034blog.hsorbo.noj05wgReverse engineering the Airport Expressigor_sk4393http://www.reddit.com/r/ReverseEngineering/comments/j05wg/reverse_engineering_the_airport_express/Falset5_2qmd0FalseFalset3_j05wghttp://blog.hsorbo.no/2010/02/reverse-engineering-airport-express.html
1305190464.034megaupload.comh9myiZeus Source Codenewgre451124http://www.reddit.com/r/ReverseEngineering/comments/h9myi/zeus_source_code/Falset5_2qmd0FalseFalset3_h9myihttp://www.megaupload.com/?d=MKCNR81M
1298988707.032fwhacking.blogspot.comfv1ombfcrypt - Open source crypto scannerfwhacking38615http://www.reddit.com/r/ReverseEngineering/comments/fv1om/bfcrypt_open_source_crypto_scanner/Falset5_2qmd0FalseFalset3_fv1omhttp://fwhacking.blogspot.com/2011/03/bfcrypt-crypto-scanner.html
1298107168.032sites.google.comfofe6Tracing - an ollydbg tutorialsimpleuser3863http://www.reddit.com/r/ReverseEngineering/comments/fofe6/tracing_an_ollydbg_tutorial/Falset5_2qmd0FalseFalset3_fofe6https://sites.google.com/site/corkami/ollydbg-tracing
1270073674.033computerworld.combkvr1Microsoft runs fuzzing botnet, finds 1,800 Office bugsjsco3521http://www.reddit.com/r/ReverseEngineering/comments/bkvr1/microsoft_runs_fuzzing_botnet_finds_1800_office/Falset5_2qmd0FalseFalset3_bkvr1http://www.computerworld.com/s/article/9174539/Microsoft_runs_fuzzing_botnet_finds_1_800_Office_bugs
1267153108.034soared.orgb6n99A proposal to create a public repository of reverse-engineered documentation of Windows and other closed-source software.ethicszen3518http://www.reddit.com/r/ReverseEngineering/comments/b6n99/a_proposal_to_create_a_public_repository_of/Falset5_2qmd0FalseFalset3_b6n99http://www.soared.org/plan/index.htm
1376594239.034usenix.org1kfr48Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring [PDF]moyix3624http://www.reddit.com/r/ReverseEngineering/comments/1kfr48/native_x86_decompilation_using/Falset5_2qmd0FalseFalset3_1kfr48https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_schwartz.pdf
1375989309.036rg-master.cs.uni-sb.de1jz3qvFormal Specification of the x86 Instruction Set Architecture (Thesis, Ulan Degenbaev) [PDF]igor_sk4158http://www.reddit.com/r/ReverseEngineering/comments/1jz3qv/formal_specification_of_the_x86_instruction_set/Falset5_2qmd0FalseFalset3_1jz3qvhttp://rg-master.cs.uni-sb.de/publikationen/UD11.pdf
1371573918.033self.ReverseEngineering1gldjzPotential linux binary malware found, where should I start?vsrz38523http://www.reddit.com/r/ReverseEngineering/comments/1gldjz/potential_linux_binary_malware_found_where_should/I found a particular binary on one of my systems and was hoping I could find someone to help me reverse it to find out what it is. Aside from the basic stuff (file, strings, md5+google search) I have found nothing on it. I believe it is malware because I found that it was being called by cron from a hijacked user account. It ran on my system for a few weeks.It is not common that I find these so I've never had the opportunity to really dive deeply into one. Hopefully someone finds some interest. Thank you!Upload: http://bit.ly/16e7eChFalset5_2qmd0FalseTruet3_1gldjzhttp://www.reddit.com/r/ReverseEngineering/comments/1gldjz/potential_linux_binary_malware_found_where_should/
1366197718.035self.ReverseEngineering1ciybs/r/ReverseEngineering's Q2 2013 Hiring Threadwtbw521717http://www.reddit.com/r/ReverseEngineering/comments/1ciybs/rreverseengineerings_q2_2013_hiring_thread/If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s). Failure to provide the details in the following format and/or answer questions will result in the post's removal.Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.Falset5_2qmd0FalseTruet3_1ciybshttp://www.reddit.com/r/ReverseEngineering/comments/1ciybs/rreverseengineerings_q2_2013_hiring_thread/moderator
1355297740.034forum.openwrt.org14ps4tPictoral guide to reverse-engineering a router PCB (physical delayering)bushing4061http://www.reddit.com/r/ReverseEngineering/comments/14ps4t/pictoral_guide_to_reverseengineering_a_router_pcb/Falset5_2qmd0FalseFalset3_14ps4thttps://forum.openwrt.org/viewtopic.php?id=39829&p=3
1355160600.031youtube.com14m2b8JEB the Android Decompiler in Actionj04n_40913http://www.reddit.com/r/ReverseEngineering/comments/14m2b8/jeb_the_android_decompiler_in_action/Falset5_2qmd0FalseFalset3_14m2b8http://www.youtube.com/watch?v=YgoVZGRDVsc&hd=1
1346550298.032travisgoodspeed.blogspot.comz7mehTravis Goodspeed's Blog: Reversing an RF Clickerrolfr43111http://www.reddit.com/r/ReverseEngineering/comments/z7meh/travis_goodspeeds_blog_reversing_an_rf_clicker/Falset5_2qmd0FalseFalset3_z7mehhttp://travisgoodspeed.blogspot.com/2010/07/reversing-rf-clicker.html
1319107256.033pandalabs.pandasecurity.comliko4Deobfuscating malicious code: layer by layerwishi3521http://www.reddit.com/r/ReverseEngineering/comments/liko4/deobfuscating_malicious_code_layer_by_layer/Falset5_2qmd0FalseFalset3_liko4http://pandalabs.pandasecurity.com/deobfuscating-malicious-code-layer-by-layer/
1296153734.032self.ReverseEngineeringfa6sqWhat is the smallest, simplest CPU that gcc can compile for?sztomi3867http://www.reddit.com/r/ReverseEngineering/comments/fa6sq/what_is_the_smallest_simplest_cpu_that_gcc_can/[I asked a question on StackOverflow](http://stackoverflow.com/questions/4817950/what-is-the-smallest-simplest-cpu-that-gcc-can-compile-for) but it didn't seem to gain much attention. I thought I'd drop it here, maybe some of you have a good suggestion. I looked at ATTINY45 and seems simple enough but I wonder if there is anything even more simplistic.Edit: Thank you guys for the many answers, I really appreciate it. I'll have some spare time in the weekend for my hobby projects, so I'll look into the suggestions in detail and will sure to post the results. Falset5_2qmd0TrueTruet3_fa6sqhttp://www.reddit.com/r/ReverseEngineering/comments/fa6sq/what_is_the_smallest_simplest_cpu_that_gcc_can/
1289850323.032self.ReverseEngineeringe6jgt##re on Freenodegnewman42104http://www.reddit.com/r/ReverseEngineering/comments/e6jgt/re_on_freenode/Hey REddit, I've created a channel on Freenode in an attempt to cater to RE professionals. A place where we can share knowledge, ask and answer questions, or just shoot the shit would be really nice. I've registered ##re and submitted a GRF so that we can possibly get #re as our official channel sometime in the near future. I hope to see some of you folks on there :)Regards,GregEdit: Remember, until the GRF goes through for #re, it's ##re (pound pound re) so that we can have access to the topic and ops. See you there!Edit 2: Wow, guys! I didn't expect this kind of response! At first glance, it seems like we might build a nice little IRC community!Falset5_2qmd0TrueTruet3_e6jgthttp://www.reddit.com/r/ReverseEngineering/comments/e6jgt/re_on_freenode/
1247007858.037self.ReverseEngineering8z3xoHow many of you are using Linux to analyze Win32 binaries?40315http://www.reddit.com/r/ReverseEngineering/comments/8z3xo/how_many_of_you_are_using_linux_to_analyze_win32/I've been considering this for the past few days. I don't have any issues reversing and programming on Windows, but it seems like an interesting endeavor to do it from Linux (through either a VM or Wine).Anyone have any comments/experiences they'd like to share?Falset5_2qmd0FalseTruet3_8z3xohttp://www.reddit.com/r/ReverseEngineering/comments/8z3xo/how_many_of_you_are_using_linux_to_analyze_win32/
1221242756.035fravia.com714tbWish fravia the bestrolfr3725http://www.reddit.com/r/ReverseEngineering/comments/714tb/wish_fravia_the_best/Falset5_2qmd0FalseFalset3_714tbhttp://fravia.com/illness.htm
1376492704.034github.com1kcnsptrapcc: Computation through Intel MMU's fault handling mechanism (for obfuscation purpose)perror3952http://www.reddit.com/r/ReverseEngineering/comments/1kcnsp/trapcc_computation_through_intel_mmus_fault/Falset5_2qmd0FalseFalset3_1kcnsphttps://github.com/jbangert/trapcc/
1371074736.030devttys0.com1g85lxDifferentiate Encryption From Compression Using Mathniko-r38815http://www.reddit.com/r/ReverseEngineering/comments/1g85lx/differentiate_encryption_from_compression_using/Falset5_2qmd0FalseFalset3_1g85lxhttp://www.devttys0.com/2013/06/differentiate-encryption-from-compression-using-math/
1370244467.031article.gmane.org1fkhvlWindows Privilege Escalation - EPATHOBJ Exploit Publicw3rterz42111http://www.reddit.com/r/ReverseEngineering/comments/1fkhvl/windows_privilege_escalation_epathobj_exploit/Falset5_2qmd0FalseFalset3_1fkhvlhttp://article.gmane.org/gmane.comp.security.full-disclosure/89491
1368715237.029blog.cmpxchg8b.com1egayaIntroduction to Windows Kernel Security Researchpolsab41120http://www.reddit.com/r/ReverseEngineering/comments/1egaya/introduction_to_windows_kernel_security_research/Falset5_2qmd0FalseFalset3_1egayahttp://blog.cmpxchg8b.com/2013/05/introduction-to-windows-kernel-security.html
1361650577.033self.ReverseEngineering193eomTrying to reverse a old .COM binary and need some in depth information about DOS..samuirai37411http://www.reddit.com/r/ReverseEngineering/comments/193eom/trying_to_reverse_a_old_com_binary_and_need_some/The binary is not publicly available therefore I NOPed the actual code.[> OnlineDisassembler with NOPs](http://onlinedisassembler.com/odaweb/disassemble/69e60906-f0d6-4a43-8f26-173d17f4f5fa?platformId=i8086#view/assembly-tab-item/offset/00)The binary takes one argument and reads data from STDIN.here is a commented version. 0x00000000 cmp sp,0xb139 ; ? why this compare 0x00000004 jb 0x0000004a ; jump below to exit 0x00000006 mov bp,0x5d ; ? why move bp after code segment 0x00000009 mov dx,0x152 ; buffer address for data 0x0000000C mov cx,0xad39 ; max read length = 0xad39 0x0000000F xor bx,bx ; read from STDIN 0x00000011 mov ah,0x3f ; 'Read File' API Code 0x00000013 int 0x21 ; DOS API Interrupt .. .. .. 0x00000051 retlater in the code, they make `lods` and `stos` from `dx (0x00000152)`.`bp` is used like this in calculations `WORD PTR [bp+0x0]`.**Please correct my following assumptions:** * The `cmp sp,0xb139` is like a check if it's a compatible DOS version or something like that? * I assume that DOS loads the binary and places the *command line arguments* behind the code segment? Maybe at `0x00000052` is `argc` and beginning with `0x0000005d` is `argv[]`? * I assume that DOS makes a data segment available for the code at `0x00000152` which can be used to read and write data. * This is an instruction in the code `lods ax,WORD PTR ds:[si]` (`si dx 0x00000152`). Let's assume it reads the arguments and at `dx` is the string 'ABCD' located. `ax` should be `0x4142` afterwards, right?Thanks for any help and information about DOS stuff :) I am happy with any URL, paper, .. what could help me :)**UPDATE:** Thank you all for your help. I understood it to a level where I was able to rewrite it in python. And I have learned so much more, thanks :)Falset5_2qmd01361728306.0Truet3_193eomhttp://www.reddit.com/r/ReverseEngineering/comments/193eom/trying_to_reverse_a_old_com_binary_and_need_some/
1354189154.032pastebin.com13zmh5Send a payload from javascript by clicking a malicious link, which bypasses firewalls and IDS systems. (no need for flash, activex or applets)goonmaster38612http://www.reddit.com/r/ReverseEngineering/comments/13zmh5/send_a_payload_from_javascript_by_clicking_a/Falset5_2qmd0FalseFalset3_13zmh5http://pastebin.com/wctPMyqB
1353986629.031eli.thegreenplace.net13upp1Life of an instruction in LLVMrolfr3760http://www.reddit.com/r/ReverseEngineering/comments/13upp1/life_of_an_instruction_in_llvm/Falset5_2qmd0FalseFalset3_13upp1http://eli.thegreenplace.net/2012/11/24/life-of-an-instruction-in-llvm/
1346348015.032crackme.orgz353hYet another crackme challengeadvanced_reddit_user3866http://www.reddit.com/r/ReverseEngineering/comments/z353h/yet_another_crackme_challenge/Falset5_2qmd0FalseFalset3_z353hhttp://crackme.org/
1312754729.030abazhanyuk.comjbtymHow to find 0-day in browsersrolfr3772http://www.reddit.com/r/ReverseEngineering/comments/jbtym/how_to_find_0day_in_browsers/Falset5_2qmd0FalseFalset3_jbtymhttp://abazhanyuk.com/?p=220
1310039422.032durandal-project.orgiiycrDurandal Project: A distributed GPU/CPU password crackersamcrem37510http://www.reddit.com/r/ReverseEngineering/comments/iiycr/durandal_project_a_distributed_gpucpu_password/Falset5_2qmd0FalseFalset3_iiycrhttp://durandal-project.org/
1308490596.036gynvael.coldwind.pli3k7wRandom bit flips in hardware and security (Why ECC for Industrial PCs)wishi39313http://www.reddit.com/r/ReverseEngineering/comments/i3k7w/random_bit_flips_in_hardware_and_security_why_ecc/Falset5_2qmd0FalseFalset3_i3k7whttp://gynvael.coldwind.pl/?id=403
1299233092.029cl.cam.ac.ukfx6rzExtracting a 3DES key from an IBM 4758fwhacking3455http://www.reddit.com/r/ReverseEngineering/comments/fx6rz/extracting_a_3des_key_from_an_ibm_4758/Falset5_2qmd0FalseFalset3_fx6rzhttp://www.cl.cam.ac.uk/~rnc1/descrack/ibm4758.html
1296323430.031buildacpu.blogspot.comfbeflHomebrew CPU Blog3652http://www.reddit.com/r/ReverseEngineering/comments/fbefl/homebrew_cpu_blog/Falset5_2qmd0FalseFalset3_fbeflhttp://buildacpu.blogspot.com/
1292201418.035ppl-pilot.com.nyud.netekq9nThe Day MAME Saved My Ass (crosspost from /r/programming)rolfr4166http://www.reddit.com/r/ReverseEngineering/comments/ekq9n/the_day_mame_saved_my_ass_crosspost_from/Falset5_2qmd0FalseFalset3_ekq9nhttp://www.ppl-pilot.com.nyud.net/mame.aspx
1288640332.031googleonlinesecurity.blogspot.comdznk9Google launches vulnerability rewards program for web properties including google.com, youtube.com, etcdarkry3766http://www.reddit.com/r/ReverseEngineering/comments/dznk9/google_launches_vulnerability_rewards_program_for/Falset5_2qmd0FalseFalset3_dznk9http://googleonlinesecurity.blogspot.com/2010/11/rewarding-web-application-security.html
1284082332.030sol.gfxile.netdbvitPorting from DOS to Windowsrolfr3663http://www.reddit.com/r/ReverseEngineering/comments/dbvit/porting_from_dos_to_windows/Falset5_2qmd0FalseFalset3_dbvithttp://sol.gfxile.net/dr_gdm.html
1283330669.029github.comd83ujPSGroove, an open-source reimplementation of the psjailbreak exploit for AT90USB and related microcontrollers.ethicszen3458http://www.reddit.com/r/ReverseEngineering/comments/d83uj/psgroove_an_opensource_reimplementation_of_the/Falset5_2qmd0FalseFalset3_d83ujhttp://github.com/psgroove/psgroove
1268432435.032upload.wikimedia.orgbcpw9x86 Disassembly - wikibooks [PDF] 3313http://www.reddit.com/r/ReverseEngineering/comments/bcpw9/x86_disassembly_wikibooks_pdf/Falset5_2qmd0FalseFalset3_bcpw9http://upload.wikimedia.org/wikibooks/en/5/53/X86_Disassembly.pdf
1245362571.032self.ReverseEngineering8tq12What are the best text for Reverse Engineering (from intro to advanced) I know of Shellcoder's handbook, but are there any hidden gems out there that you would take to a deserted island? Or should ignore books start from Phrack #1?new_to_re33111http://www.reddit.com/r/ReverseEngineering/comments/8tq12/what_are_the_best_text_for_reverse_engineering/Falset5_2qmd0FalseTruet3_8tq12http://www.reddit.com/r/ReverseEngineering/comments/8tq12/what_are_the_best_text_for_reverse_engineering/
1372374974.027self.ReverseEngineering1h7n91Administrivia: 20,000 subscribers, nearly five years of existencerolfr37106http://www.reddit.com/r/ReverseEngineering/comments/1h7n91/administrivia_20000_subscribers_nearly_five_years/Hi folks,The reverse engineering reddit has just reached 20,000 subscribers. While I'm not sure what that number means in absolute terms, it is nevertheless a nice and round figure. The 10,000 mark came at New Year 2011/2012, so our growth has accelerated. I would like to thank everybody who's contributed in a meaningful and positive way to this experiment, whether by posting links, or making comments, or writing material that has been featured here. We're still going strong after nearly five years of operation, and I hope we can continue to be the Internet's most worthwhile destination for reverse engineering links and discussion.Any suggestions or feedback on how to run this website for an even better experience would be appreciated.Thanks again,Rolf Rolles, creator and moderatorFalset5_2qmd01372376848.0Truet3_1h7n91http://www.reddit.com/r/ReverseEngineering/comments/1h7n91/administrivia_20000_subscribers_nearly_five_years/
1367919583.032youtube.com1duq7lDEFCON 16: Advanced Software Armoring and Polymorphic Kung Fukamicc4081http://www.reddit.com/r/ReverseEngineering/comments/1duq7l/defcon_16_advanced_software_armoring_and/Falset5_2qmd0FalseFalset3_1duq7lhttp://www.youtube.com/watch?v=wdFLK_eX0QY
1366070440.031youtu.be1cfc2e[x/electronics] Reverse engineering the iPod Nano 6 LCD interface (mikeselectricstuff)kasbah3762http://www.reddit.com/r/ReverseEngineering/comments/1cfc2e/xelectronics_reverse_engineering_the_ipod_nano_6/Falset5_2qmd0FalseFalset3_1cfc2ehttp://youtu.be/7TedIzmguP0
1357585165.035blog.exodusintel.com164t1nWriteup of a ASLR/PIE/NX/stack cookie-bypassing remote exploit against Asteriskrolfr4492http://www.reddit.com/r/ReverseEngineering/comments/164t1n/writeup_of_a_aslrpienxstack_cookiebypassing/Falset5_2qmd0FalseFalset3_164t1nhttp://blog.exodusintel.com/2013/01/07/who-was-phone/
1356497799.028skoe.de15gc0jThe C64 PLA Dissected [PDF]rolfr3793http://www.reddit.com/r/ReverseEngineering/comments/15gc0j/the_c64_pla_dissected_pdf/Falset5_2qmd0FalseFalset3_15gc0jhttp://skoe.de/docs/c64-dissected/pla/c64_pla_dissected_a4ss.pdf
1356454755.031pastebin.com15fbsmNVidia Display Driver Service (Nsvr) Exploitidiamin_3982http://www.reddit.com/r/ReverseEngineering/comments/15fbsm/nvidia_display_driver_service_nsvr_exploit/Falset5_2qmd0FalseFalset3_15fbsmhttp://pastebin.com/QP7eZaJt
1352363613.0322012.hack.lu12ukraA Critical Analysis of Dropbox Software Security [PDF, slides]rolfr3974http://www.reddit.com/r/ReverseEngineering/comments/12ukra/a_critical_analysis_of_dropbox_software_security/Falset5_2qmd0FalseFalset3_12ukrahttp://2012.hack.lu/archive/2012/Dropbox%20security.pdf
1351622104.033waleedassar.blogspot.com12cmvlVirtual PC vs. CPUIDwaliedassar42910http://www.reddit.com/r/ReverseEngineering/comments/12cmvl/virtual_pc_vs_cpuid/Falset5_2qmd0FalseFalset3_12cmvlhttp://waleedassar.blogspot.com/2012/10/virtual-pc-vs-cpuid.html
1331137021.030securelist.comqlv53The Mystery of the Duqu Framework - More information on Duqu's unknown implemetation languagepwnwaffe41117http://www.reddit.com/r/ReverseEngineering/comments/qlv53/the_mystery_of_the_duqu_framework_more/Falset5_2qmd0FalseFalset3_qlv53http://www.securelist.com/en/blog/667/The_Mystery_of_the_Duqu_Framework
1328109965.035security-class.orgp66whOnline free computer security class teached by Berkeley and Standford university teachers. Starts this month.ar1vr4496http://www.reddit.com/r/ReverseEngineering/comments/p66wh/online_free_computer_security_class_teached_by/Falset5_2qmd0FalseFalset3_p66whhttp://www.security-class.org/
1327452251.032reverse.put.asovabzA crackme challenge for OS Xsheafification4190http://www.reddit.com/r/ReverseEngineering/comments/ovabz/a_crackme_challenge_for_os_x/Falset5_2qmd0FalseFalset3_ovabzhttp://reverse.put.as/2012/01/24/my-first-crackme-from-hell-i-hope/
1322413441.031events.ccc.demqyg228C3 conference scheduleigor_sk3651http://www.reddit.com/r/ReverseEngineering/comments/mqyg2/28c3_conference_schedule/Falset5_2qmd0FalseFalset3_mqyg2http://events.ccc.de/congress/2011/Fahrplan/events.en.html
1321667194.035attrition.orgmhmc4attrition.org's InfoSec Institute roundup 2: plagiarism by Jack Koziol (the president) of many sources such as Sotirov & Dowd and Blunden's 'The Rootkit Arsenal', plagiarism by InfoSec Institute attributed to unwitting contractors, plagiarism by instructors, and 11 Better Business Bureau complaintsfl0rid4274http://www.reddit.com/r/ReverseEngineering/comments/mhmc4/attritionorgs_infosec_institute_roundup_2/Falset5_2qmd0FalseFalset3_mhmc4http://attrition.org/errata/charlatan/infosec_institute/
1318217561.029hackaday.coml6o7cReal-time Hacking of a C64tontoto3672http://www.reddit.com/r/ReverseEngineering/comments/l6o7c/realtime_hacking_of_a_c64/Falset5_2qmd0FalseFalset3_l6o7chttp://hackaday.com/2009/08/29/c64-visual-debugger/
1315264343.029kbhomes.github.comk5t4cSyncing Zune w/o the proprietary software - reverse engineering the MTPZ protocolKBHomes3895http://www.reddit.com/r/ReverseEngineering/comments/k5t4c/syncing_zune_wo_the_proprietary_software_reverse/Falset5_2qmd0FalseFalset3_k5t4chttp://kbhomes.github.com/blog.html?tag=mtpz
1310546091.034j00ru.vexillium.orgio9x3CVE-2011-1281: A story of a Windows CSRSS Privilege Escalation vulnerability_pusher_3510http://www.reddit.com/r/ReverseEngineering/comments/io9x3/cve20111281_a_story_of_a_windows_csrss_privilege/Falset5_2qmd0FalseFalset3_io9x3http://j00ru.vexillium.org/?p=893
1297254247.028self.ReverseEngineeringfhyzhIs there a reliable DLL injection technique?usualsuspect35710http://www.reddit.com/r/ReverseEngineering/comments/fhyzh/is_there_a_reliable_dll_injection_technique/I'm currently trying to write some tool and I learned the hard way that there doesn't seem to be any reliable technique for DLL injection.I thought CreateRemoteThread() works pretty much all the time, but it simply doesn't. The simplest test case is packing notepad with UPX and then trying to inject a DLL after calling CreateProcess('notepad',CREATE_SUSPENDED). You always end up with a zombie process, no matter what.What I'm exactly trying to do is injecting a DLL in a hooked CreateProcess function. I know Detours offers CreateProcessWithDll, but I don't want to use Detours. For once, I hate the detoured.dll marker and I'm sure patching it out isn't trivial at all.So I'm stuck with homemade solutions. Googling suggested using WaitForInputIdle() for GUI processes to make it work, but in the end even this didn't launch an UPXed notepad.My current approach: CreateProcess(CREATE_SUSPENDED), retrieving the OEP, overwriting it with EB FE (infinite loop) so I can let the process run and let Windows do its thing with initialization. After a small timeout, I suspend the main thread, inject my DLL, restore the OEP and call ResumeThread. In theory this works, but for one reason or another, UPX-notepad wins again.Any ideas?Edit: I feel stupid, but I made a mistake and now that it's corrected, the EB FE injection technique actually works. I run the target suspended, find out the OEP, write EB FE and let it run. This enables Windows to do its initialization. A generous Sleep(1000) later, the process should be looping as fast as it can. I then inject a LoadLibrary into the running process, suspend the thread, restore the OEP, call FlushInstructionCase() on it so there are no cache-related errors and then I resume the thread, unless the caller requested a suspended thread. Seems to actually work as planned!Falset5_2qmd0TrueTruet3_fhyzhhttp://www.reddit.com/r/ReverseEngineering/comments/fhyzh/is_there_a_reliable_dll_injection_technique/
1296842389.029amnesia.gtisc.gatech.eduffbgpComparing Windows kernel data structures over timemoyix3452http://www.reddit.com/r/ReverseEngineering/comments/ffbgp/comparing_windows_kernel_data_structures_over_time/Falset5_2qmd0FalseFalset3_ffbgphttp://amnesia.gtisc.gatech.edu/~moyix/tpcompare/withnums/
1295182626.031vupen.comf392nTechnical Analysis of the Windows Win32K.sys Keyboard Layout Stuxnet Exploitsanitybit3320http://www.reddit.com/r/ReverseEngineering/comments/f392n/technical_analysis_of_the_windows_win32ksys/Falset5_2qmd0FalseFalset3_f392nhttp://www.vupen.com/blog/20101018.Stuxnet_Win32k_Windows_Kernel_0Day_Exploit_CVE-2010-2743.php
1290621034.034codeproject.comeb7f3UAC kernel bypass burned on CodeProject! s7ephen4067http://www.reddit.com/r/ReverseEngineering/comments/eb7f3/uac_kernel_bypass_burned_on_codeproject/Falset5_2qmd0FalseFalset3_eb7f3http://www.codeproject.com/KB/vista-security/uac.aspx
1290098091.028tramm.lie85w3Intel 8080 CPU Emulator - written in Javascript3571http://www.reddit.com/r/ReverseEngineering/comments/e85w3/intel_8080_cpu_emulator_written_in_javascript/Falset5_2qmd0FalseFalset3_e85w3http://www.tramm.li/i8080/
1262629321.030self.ReverseEngineeringalgthI have a small challenge for you guys, if you're up for it.Poromenos32253http://www.reddit.com/r/ReverseEngineering/comments/algth/i_have_a_small_challenge_for_you_guys_if_youre_up/EDIT: I have written a small script to bruteforce WPA keys for Thomson/SpeedTouch routers from their SSIDs, you can find it here if you want it:[Script to derive the WPA key for a Thomson/SpeedTouch router from its SSID](http://www.korokithakis.net/node/107)--------So, I have a router that includes telephony using SIP. The router connects to my phone company and converts my normal phone to a SIP phone.The thing is, my mobile phone supports SIP over wifi as well and I would like to use it as a cordless phone when I'm home, but the company won't give me the SIP password or the password to the router, even though I bought it, so I am trying to reverse-engineer it.The router is a Thomson TG782 (a.k.a. SpeedTouch). It uses some sort of encryption to encrypt my password with the router's serial number. I guess I could reset the router, log in as admin, replace the config with the encrypted password and read the decrypted one on the web interface, but it is too much of a hassle and I would not have internet access or phone during that period. Can anyone help me with the decryption?I tried getting the router to encrypt some strings just to test, and this is what I got (the table is crypttext: 'plaintext'): C45B052831543A08 '5' C2A118E2B5C4B516 '55' 4240563093758E0A '555' 84A52E4E314D35B9 '5555' CE74F5ABBD788355 '55555' 646CFB9FB705CCC1 '555555' 0AD7529A3F317E1A '5555555' 3ECBA425474E3AFC '55555555' 3ECBA425474E3AFCC45B052831543A08 '555555555' 3ECBA425474E3AFCC2A118E2B5C4B516 '5555555555'I know this isn't XOR, but it doesn't look like AES either.. Any ideas?**EDIT:** Well, I just had the bright idea to use the telnet interface (where I've been dumping the encrypted config from all these days) to set the dyndns hash to the SIP hash and just see it decrypted in the HTML. It worked, I have the password. Why didn't I think of this earlier? :/ It would be nice to have a general way to decrypt all Thomson routers' passwords given the serial, but I can't find anything about the encryption algorithm..Falset5_2qmd0TrueTruet3_algthhttp://www.reddit.com/r/ReverseEngineering/comments/algth/i_have_a_small_challenge_for_you_guys_if_youre_up/
1244733565.030phrack.org8row0New phrackrolfr3220http://www.reddit.com/r/ReverseEngineering/comments/8row0/new_phrack/Falset5_2qmd0FalseFalset3_8row0http://phrack.org/
1368900026.031lightbluetouchpaper.org1el4okRendezvous: A Search Engine for Binary Code_rc3760http://www.reddit.com/r/ReverseEngineering/comments/1el4ok/rendezvous_a_search_engine_for_binary_code/Falset5_2qmd0FalseFalset3_1el4okhttp://www.lightbluetouchpaper.org/2013/05/14/a-search-engine-for-code/
1365895588.030gironsec.com1cao94Reversing A Botnet 2 - Electric BoogalooAv3ragej0e37714http://www.reddit.com/r/ReverseEngineering/comments/1cao94/reversing_a_botnet_2_electric_boogaloo/Falset5_2qmd0FalseFalset3_1cao94http://www.gironsec.com/blog/2013/04/reversing-a-botnet-2-electric-boogaloo/
1361582097.030this8bitlife.com1920nhAdventures in Linux: Reverse Engineering Firmwarezharguy3661http://www.reddit.com/r/ReverseEngineering/comments/1920nh/adventures_in_linux_reverse_engineering_firmware/Falset5_2qmd0FalseFalset3_1920nhhttp://this8bitlife.com/adventures-in-linux-reverse-engineering-firmware/
1359513696.031console-cowboys.blogspot.com17jcc1Swann Song - DVR Insecurityigor_sk3652http://www.reddit.com/r/ReverseEngineering/comments/17jcc1/swann_song_dvr_insecurity/Falset5_2qmd0FalseFalset3_17jcc1http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html
1357060619.031thehackeracademy.com15rz49My talk on Analyzing Malware in Memory is now mirrored online (video + slides)transt3323http://www.reddit.com/r/ReverseEngineering/comments/15rz49/my_talk_on_analyzing_malware_in_memory_is_now/Falset5_2qmd0FalseFalset3_15rz49https://www.thehackeracademy.com/public-replay-tha-deep-dive-analyzing-malware-in-memory/
1356150547.031devttys0.com159lerBinwalk 0.5 Releaseniko-r3321http://www.reddit.com/r/ReverseEngineering/comments/159ler/binwalk_05_release/Falset5_2qmd0FalseFalset3_159lerhttp://www.devttys0.com/2012/12/binwalk-0-5-release/
1354818884.033dexter.dexlabs.org14e97gDexter - A static android application analysis toolandyac3962http://www.reddit.com/r/ReverseEngineering/comments/14e97g/dexter_a_static_android_application_analysis_tool/Falset5_2qmd0FalseFalset3_14e97ghttp://dexter.dexlabs.org/
1352839992.027linuxch.org13540wPwning Multiplayer Online GamesN3mes1s3588http://www.reddit.com/r/ReverseEngineering/comments/13540w/pwning_multiplayer_online_games/Falset5_2qmd0FalseFalset3_13540whttp://linuxch.org/poc2012/Auriemma%20&%20Ferrante,%20Pwning%20Multiplayer%20Online%20Games.pdf
1345261858.029thelegendofrandom.comyewdfR4ndoms Sixteenth Reverse Engineering Tutorial, Part 3- BruteforcingRandomNetzley45161http://www.reddit.com/r/ReverseEngineering/comments/yewdf/r4ndoms_sixteenth_reverse_engineering_tutorial/Falset5_2qmd0FalseFalset3_yewdfhttp://thelegendofrandom.com/blog/archives/1425
1321190736.030blogs.avg.commaozrUsing setusermatherror to disguise code flow.quitelikeme3774http://www.reddit.com/r/ReverseEngineering/comments/maozr/using_setusermatherror_to_disguise_code_flow/Falset5_2qmd0FalseFalset3_maozrhttp://blogs.avg.com/news-threats/floating-point-math-functions-abused/
1320578990.031blog.w4kfu.comm2b5qDuqu:New method of injectioninreverse3871http://www.reddit.com/r/ReverseEngineering/comments/m2b5q/duqunew_method_of_injection/Falset5_2qmd0FalseFalset3_m2b5qhttp://blog.w4kfu.com/post/new_method_of_injection
1314060248.030self.ReverseEngineeringjr5qhAAA Game Studio Anti-Cheat Engineering jlawniczak36618http://www.reddit.com/r/ReverseEngineering/comments/jr5qh/aaa_game_studio_anticheat_engineering/We are getting ready to launch our game Firefall (www.firefallthegame.com) and it is getting a lot of press and excitement. In that capacity we need someone to help us build our anti-cheat platform. Someone dedicated to writing the client-side and server side portions of anti-cheat. Preferably a senior windows programmer. The client scans memory and protects files and reports violations to the server. The server tracks those violations, elevates them to customer support and is also responsible for verifying the integrity of the client application and auto-updating that on a regular basis. We need a low level windows programmer with a passion for games.Anyone interested who has a strong interest in Games and tackling this effort? We offer a competitive salary, an amazing product development team and the opportunity for financial rewards with a profit sharing program too.Thanks and I hope to hear from you soon./JeffJeff Lawniczak Director of Talent Acquisition Jeff@red5Studios.com 949 870-0171Falset5_2qmd0FalseTruet3_jr5qhhttp://www.reddit.com/r/ReverseEngineering/comments/jr5qh/aaa_game_studio_anticheat_engineering/
1309188542.026simplemachines.itiae7mThe ARM Instruction Set [PDF]3261http://www.reddit.com/r/ReverseEngineering/comments/iae7m/the_arm_instruction_set_pdf/Falset5_2qmd0FalseFalset3_iae7mhttp://www.simplemachines.it/doc/arm_inst.pdf
1293494309.030rdist.root.orgesa3qBuilding a USB protocol analyzersanitybit3110http://www.reddit.com/r/ReverseEngineering/comments/esa3q/building_a_usb_protocol_analyzer/Falset5_2qmd0FalseFalset3_esa3qhttp://rdist.root.org/2010/12/27/building-a-usb-protocol-analyzer/
1292715636.031networkforensics.comeo3i7VM Detection by In-The-Wild MalwareNinjaYoda3873http://www.reddit.com/r/ReverseEngineering/comments/eo3i7/vm_detection_by_inthewild_malware/Falset5_2qmd0FalseFalset3_eo3i7http://www.networkforensics.com/2010/12/13/vm-detection-by-in-the-wild-malware/
1292364917.030cryptolux.orgelv3eAll Your Baseband Are Belong To Us - over-the-air exploitation of memory corruptions in GSM software stacks [slides]ketti3440http://www.reddit.com/r/ReverseEngineering/comments/elv3e/all_your_baseband_are_belong_to_us_overtheair/Falset5_2qmd0FalseFalset3_elv3ehttps://cryptolux.org/media/deepsec-aybbabtu.pdf
1288920329.030adafruit.come1h8erepost from /r/linux: get $2,000 bounty for Kinect for Xbox 360 open source driversshazzner3224http://www.reddit.com/r/ReverseEngineering/comments/e1h8e/repost_from_rlinux_get_2000_bounty_for_kinect_for/Falset5_2qmd0FalseFalset3_e1h8ehttp://www.adafruit.com/blog/2010/11/04/the-open-kinect-project-the-ok-prize-get-1000-bounty-for-kinect-for-xbox-360-open-source-drivers/
1373614592.027c4decompiler.com1i52lyC4Decompiler Alpha 0.7.1 - some progressCarstenC43587http://www.reddit.com/r/ReverseEngineering/comments/1i52ly/c4decompiler_alpha_071_some_progress/Falset5_2qmd0FalseFalset3_1i52lyhttp://www.c4decompiler.com/category/changelog/
1367554521.028j00ru.vexillium.org1dlmhrBochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patternsrolfr39113http://www.reddit.com/r/ReverseEngineering/comments/1dlmhr/bochspwn_exploiting_kernel_race_conditions_found/Falset5_2qmd0FalseFalset3_1dlmhrhttp://j00ru.vexillium.org/?p=1695
1367505020.030shell-storm.org1djw07A binary analysis, count me if you canjonathansalwan3444http://www.reddit.com/r/ReverseEngineering/comments/1djw07/a_binary_analysis_count_me_if_you_can/Falset5_2qmd0FalseFalset3_1djw07http://shell-storm.org/blog/A-binary-analysis-count-me-if-you-can/
1359238309.029waleedassar.blogspot.com17c453Injecting 64-Bit DLL Into 32-Bit Processwaliedassar3455http://www.reddit.com/r/ReverseEngineering/comments/17c453/injecting_64bit_dll_into_32bit_process/Falset5_2qmd0FalseFalset3_17c453http://waleedassar.blogspot.com/2013/01/wow64logdll.html
1350153064.029irongeek.com11f9nbDerbycon 2012 videosigor_sk3230http://www.reddit.com/r/ReverseEngineering/comments/11f9nb/derbycon_2012_videos/Falset5_2qmd0FalseFalset3_11f9nbhttp://www.irongeek.com/i.php?page=videos/derbycon2/mainlist
1342114091.029youtube.comwg960Dumping Polymorphic Malware from Memorymauvehead3344http://www.reddit.com/r/ReverseEngineering/comments/wg960/dumping_polymorphic_malware_from_memory/Falset5_2qmd0FalseFalset3_wg960http://www.youtube.com/watch?v=Rh2WoRRVKos&feature=player_embedded
1341287875.029openrce.orgvyn1eVideo of my RECON 2012 Keynote: The Case for Semantics-Based Methods in Reverse Engineeringrolfr3231http://www.reddit.com/r/ReverseEngineering/comments/vyn1e/video_of_my_recon_2012_keynote_the_case_for/Falset5_2qmd0FalseFalset3_vyn1ehttp://www.openrce.org/blog/view/2201/Video_of_my_RECON_2012_Keynote:_The_Case_for_Semantics-Based_Methods_in_Reverse_Engineering
1338137107.029thelegendofrandom.comu7f47An introduction to OllyDBG- a tutorial by R4ndomRandomNetzley43146http://www.reddit.com/r/ReverseEngineering/comments/u7f47/an_introduction_to_ollydbg_a_tutorial_by_r4ndom/Falset5_2qmd0FalseFalset3_u7f47http://thelegendofrandom.com/blog/archives/31
1333591569.029self.ReverseEngineeringrtzb0Disassembling in IDAbrianethan36714http://www.reddit.com/r/ReverseEngineering/comments/rtzb0/disassembling_in_ida/Does anyone know how does IDA differentiate between data and code in its disassembling? Also, what happens if the entry point is missing? How does it know where code starts?Thanks in advance!Falset5_2qmd0FalseTruet3_rtzb0http://www.reddit.com/r/ReverseEngineering/comments/rtzb0/disassembling_in_ida/
1329269958.029coranac.compq0x8Whirlwind Tour of ARM Assemblyroflmaoff3230http://www.reddit.com/r/ReverseEngineering/comments/pq0x8/whirlwind_tour_of_arm_assembly/Falset5_2qmd0FalseFalset3_pq0x8http://www.coranac.com/tonc/text/asm.htm
1325887237.031mjg59.dreamwidth.orgo5yhwFirmware bugs considered enragingigor_sk3430http://www.reddit.com/r/ReverseEngineering/comments/o5yhw/firmware_bugs_considered_enraging/Falset5_2qmd0FalseFalset3_o5yhwhttp://mjg59.dreamwidth.org/9525.html
1324982652.032docs.google.comns6jaThe Ultimate Anti-Debugging Reference [PDF via Google Docs]advanced_reddit_user3531http://www.reddit.com/r/ReverseEngineering/comments/ns6ja/the_ultimate_antidebugging_reference_pdf_via/Falset5_2qmd0FalseFalset3_ns6jahttp://docs.google.com/viewer?url=http%3A%2F%2Fpferrie.host22.com%2Fpapers%2Fantidebug.pdf
1324570301.031syprog.blogspot.comnmq3aSimple Virtual machine implementationpraddo3654http://www.reddit.com/r/ReverseEngineering/comments/nmq3a/simple_virtual_machine_implementation/Falset5_2qmd0FalseFalset3_nmq3ahttp://syprog.blogspot.com/2011/12/simple-virtual-machine.html
1320836409.027devttys0.comm5zc7Exploiting Embedded Systems Part 4igor_sk39120http://www.reddit.com/r/ReverseEngineering/comments/m5zc7/exploiting_embedded_systems_part_4/Falset5_2qmd0FalseFalset3_m5zc7http://www.devttys0.com/2011/11/exploiting-embedded-systems-part-4/
1319636176.029devttys0.comlpnv3Exploiting Embedded Systems Part 1igor_sk39108http://www.reddit.com/r/ReverseEngineering/comments/lpnv3/exploiting_embedded_systems_part_1/Falset5_2qmd0FalseFalset3_lpnv3http://www.devttys0.com/2011/09/exploiting-embedded-systems-part-1/
1313989191.029self.ReverseEngineeringjqalhA few pointers on getting started in RE?queensgetdamoney35626http://www.reddit.com/r/ReverseEngineering/comments/jqalh/a_few_pointers_on_getting_started_in_re/Disclaimer: This is more than likely going to be a throwaway account, but I will check back up on this :)Now that's out of the way,I was just curious as to where is the best place to start in the field of RE. I'm very keen when it comes to pulling things apart physically and enjoy tracking malware changes on systems I come across (I work in support :P). I have a somewhat limited grasp on RE (I've gone through a few of Lena151's tutorials before) and am rather keen to pursue this as a hobby and even potentially career wise in the future. Any suggestions?Cheers!Falset5_2qmd0FalseTruet3_jqalhhttp://www.reddit.com/r/ReverseEngineering/comments/jqalh/a_few_pointers_on_getting_started_in_re/
1308543215.030self.ReverseEngineeringi41p2Job: Kaspersky Labs - Anti-Malware Researcher3772http://www.reddit.com/r/ReverseEngineering/comments/i41p2/job_kaspersky_labs_antimalware_researcher/** Note ** I am not the recruiter. I'm posting this on behalf of someone who contacted me. Just trying to help out. * Details:The Anti-Malware Researcher will conduct day to day research under the supervision of the Senior Anti-Malware Researchers to support the overall global research plan, and also support the Anti-Malware Research Team in their research initiatives and speaking engagements.* Responsibilities:Analyze malware and/or spam and/or phishing or any other malicious content under the supervision of the Senior Researcher and in conjunction with HQ initiatives.Create generic behavior based malware detections in order to increasing the efficiency of the product line.Manage regional research technical resources – servers, databases, and ensure that all collected data is available for sharing with HQ.Maintain honeypots, web crawlers and all other>1308235310.028d0cs4vage.blogspot.comi18ybInsecticides don't kill bugs, Patch Tuesdays dopolsab3570http://www.reddit.com/r/ReverseEngineering/comments/i18yb/insecticides_dont_kill_bugs_patch_tuesdays_do/Falset5_2qmd0FalseFalset3_i18ybhttp://d0cs4vage.blogspot.com/2011/06/insecticides-dont-kill-bugs-patch.html
1306830053.030madoc.bib.uni-mannheim.deho3deInternals of Windows Memory Management(not only) for Malware Analysiscwillems3111http://www.reddit.com/r/ReverseEngineering/comments/ho3de/internals_of_windows_memory_management_not_only/Falset5_2qmd0FalseFalset3_ho3dehttp://madoc.bib.uni-mannheim.de/madoc/volltexte/2011/3148/pdf/InternalsOfWindowsMemoryMangement2.pdf
1303752898.030github.comgx3toSWFREtools - SWF file reverse engineering tools3332http://www.reddit.com/r/ReverseEngineering/comments/gx3to/swfretools_swf_file_reverse_engineering_tools/Falset5_2qmd0FalseFalset3_gx3tohttps://github.com/sporst/SWFREtools
1302524966.029ollydbg.degnchiOllyDbg 2.01 alpha 3 rlsed!newgre3341http://www.reddit.com/r/ReverseEngineering/comments/gnchi/ollydbg_201_alpha_3_rlsed/Falset5_2qmd0FalseFalset3_gnchihttp://www.ollydbg.de/odbg201c.zip
1298667185.032self.ReverseEngineeringfsseoJob openings for reverse engineers (ninjas only, please)katiechante471568http://www.reddit.com/r/ReverseEngineering/comments/fsseo/job_openings_for_reverse_engineers_ninjas_only/Hi Reddit :)If you **like** coding in languages like assembly and C, we want to talk to you. If you enjoy figuring out how things like your Operating System are working, on an intimate level, you are the kind of person we want. If you like patching closed-source binaries, playing with binary protection schemes, or unpacking malware, you should contact me.Or if you want something *challenging*, we've got *challenging* too.If you're looking for a new job in kernel programming, static/dynamic reverse engineering or applied security research, **this is more important than your pedigree**. If you want marketing cheese about our competitive salaries, giant ping pong table, happy hours; email me, I've got that.And here's some of the job, again, but in bullet-form:* Triage and analyze binary code to determine its functionality and purpose* Perform dynamic and static analysis of malicious binaries to determine its characteristics* Learn new platforms, file formats and protocols as necessary* Automate the analysis of malicious code* Develop new malicious code analysis and detection tools.But really, you should just skip all else and email me something interesting at katiechante@gmail.comCommon /r/ReverseEngineering, you know you want to.Falset5_2qmd0TrueTruet3_fsseohttp://www.reddit.com/r/ReverseEngineering/comments/fsseo/job_openings_for_reverse_engineers_ninjas_only/
1298306878.029i-web.i.u-tokyo.ac.jpfpmucWindows Internals Lecturesgljiva3346http://www.reddit.com/r/ReverseEngineering/comments/fpmuc/windows_internals_lectures/Falset5_2qmd0FalseFalset3_fpmuchttp://i-web.i.u-tokyo.ac.jp/edu/training/ss/lecture/new-documents/Lectures/
1296502226.029corelan.befck63The Honeypot Incident – How strong is your UF (Reversing FU)3014http://www.reddit.com/r/ReverseEngineering/comments/fck63/the_honeypot_incident_how_strong_is_your_uf/Falset5_2qmd0FalseFalset3_fck63http://www.corelan.be:8800/index.php/2011/01/31/the-honeypot-incident-how-strong-is-your-uf-reversing-fu/
1291132378.032hex-rays.comedy0wIDA Pro 6.0 demo: Win32, Linux, OS X versions availableigor_sk40821http://www.reddit.com/r/ReverseEngineering/comments/edy0w/ida_pro_60_demo_win32_linux_os_x_versions/Falset5_2qmd0FalseFalset3_edy0whttp://www.hex-rays.com/idapro/idadowndemo.htm?rrr
1283350065.030ps3wiki.lan.std8743Analysis of the PSJailbreak Exploit - Documentation from the development of the opensource PSGroove exploit.phire3550http://www.reddit.com/r/ReverseEngineering/comments/d8743/analysis_of_the_psjailbreak_exploit_documentation/Falset5_2qmd0FalseFalset3_d8743http://ps3wiki.lan.st/index.php/PSJailbreak_Exploit_Reverse_Engineering
1283189284.029chrisfenton.comd7b5gHomebrew Cray-1a3230http://www.reddit.com/r/ReverseEngineering/comments/d7b5g/homebrew_cray1a/Falset5_2qmd0FalseFalset3_d7b5ghttp://chrisfenton.com/homebrew-cray-1a/
1269901181.032geohotps3.blogspot.combjw64George Hotz responds to Sony removing PS3 Linux support in a firmware updateethicszen3973http://www.reddit.com/r/ReverseEngineering/comments/bjw64/george_hotz_responds_to_sony_removing_ps3_linux/Falset5_2qmd0FalseFalset3_bjw64http://geohotps3.blogspot.com/2010/03/wait-you-are-removing-feature.html
1268233238.029hexblog.combbmm1Preview of the new cross-platform IDA Pro GUI (using Qt)wtbw3234http://www.reddit.com/r/ReverseEngineering/comments/bbmm1/preview_of_the_new_crossplatform_ida_pro_gui/Falset5_2qmd0FalseFalset3_bbmm1http://hexblog.com/2010/03/preview_of_the_next_generation.html
1259125845.027rnicrosoft.neta7xcwX86/Win32 Reverse Engineering Cheat Sheet [pdf]3038http://www.reddit.com/r/ReverseEngineering/comments/a7xcw/x86win32_reverse_engineering_cheat_sheet_pdf/Falset5_2qmd0FalseFalset3_a7xcwhttp://www.rnicrosoft.net/docs/X86_Win32_Reverse_Engineering_Cheat_Sheet.pdf
1249944310.029usenix.org99djqA Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators [PDF]cloudburst3120http://www.reddit.com/r/ReverseEngineering/comments/99djq/a_fistful_of_redpills_how_to_automatically/Falset5_2qmd0FalseFalset3_99djqhttp://www.usenix.org/events/woot09/tech/full_papers/paleari.pdf
1221140888.030self.ReverseEngineering70w0vThis sub-reddit needs an upside-down and backwards reddit alien icon!Wriiight38820http://www.reddit.com/r/ReverseEngineering/comments/70w0v/this_subreddit_needs_an_upsidedown_and_backwards/Falset5_2qmd0FalseTruet3_70w0vhttp://www.reddit.com/r/ReverseEngineering/comments/70w0v/this_subreddit_needs_an_upsidedown_and_backwards/
1370212381.027opensecuritytraining.info1fjlakOST Reverse Engineering Malware videos posted & materials updatedOpenSecurityTraining3582http://www.reddit.com/r/ReverseEngineering/comments/1fjlak/ost_reverse_engineering_malware_videos_posted/Falset5_2qmd0FalseFalset3_1fjlakhttp://opensecuritytraining.info/ChangeBlog/Entries/2013/6/2_Reverse_Engineering_Malware_videos_released!.html
1369061684.029youtube.com1ep2urReverse Engineering a Mass Transit Ticketing System - TrainHack (Ruxcon2012) [Video]perror3235http://www.reddit.com/r/ReverseEngineering/comments/1ep2ur/reverse_engineering_a_mass_transit_ticketing/Falset5_2qmd0FalseFalset3_1ep2urhttp://www.youtube.com/watch?v=iHoEyYcCBW4
1368658849.028self.ReverseEngineering1eexvsRecon 2013 Talks selectionhugo_fortier3248http://www.reddit.com/r/ReverseEngineering/comments/1eexvs/recon_2013_talks_selection/We have finalized the talk selection for Recon 2013(http://recon.cx):- Apple iCloud services reversed inside out by Andrey Malyshev- The Future of RE: Dynamic Binary Visualization by Christopher Domas- Hybrid Code Analysis: Overcoming Weaknesses of Dynamic Analysis in Malware Forensics by Stefan Buehlmann and Jan Miller- Taint Nobody Got Time for Crash Analysis by Richard Johnson and pa_kt- Haow do I sandbox?!?! - Cuckoo Sandbox Internals by Jurriaan Bremer - New ways to manage secret for software protection by David Baptiste - Just keep trying ! Unorthodox ways to hack an old-school hardware by Bacura- XNU Spelunking or Fuzzing the kernel inside your kernel by Jesse D'Aguanno - Inside EMET 4.0 by Elias Bachaalany- OpenGarages: Vehicle Research Labs by Craig Smith (30 Minutes) - Hot-Wiring of the Future:! Exploring Car CAN Buses! by Grayson Zulauf, Christopher Hoder Theodore Sumers and Daniel Bilar (30 Minutes) - Wardriving from your pocket: Using Wireshark to Reverse Engineer Broadcom WiFi chipsets by Omri Ildis and Ruby Feinstein- Hiding @ Depth by Josh Thomas (30 Minutes) - Reversing P25 Radio Scanners by Gabriel Tremblay (30 Minutes) - Hardware reverse engineering tools : new threats and opportunities by Olivier Thomas- Teridian SoC Exploitation: Exploration of harvard architecture smart grid systems by Josh Thomas and Nathan Keltner- Reversing HLR, HSS and SPR: rooting the heart of the Network and Mobile cores from Huawei to Ericsson by Philippe Langlois- Reversing and Auditing Android's Proprietary Bits by Joshua J. Drake - In-depth Reverse Engineering of HackingTeam's Remote Control System by by Nicolas Brulez and Marta Janus - I got 99 problems but a kernel pointer ain't one by Alex Ionescu - Keep your tentacles off my bus, introducing Die Datenkrake by Dmitry Nedospasov and Thorsten Schroder - Reconstructing Gapz: Position-Independent Code Analysis Problem by Aleksandr Matrosov and Eugene Rodionov - Many More Tamagotchis Were Harmed in the Making of this Presentation by Natalie SilvanovichFalset5_2qmd01368661227.0Truet3_1eexvshttp://www.reddit.com/r/ReverseEngineering/comments/1eexvs/recon_2013_talks_selection/
1367422359.027welivesecurity.com1dhhx4Avatar Rootkit Analysis by ESETnullandnull3362http://www.reddit.com/r/ReverseEngineering/comments/1dhhx4/avatar_rootkit_analysis_by_eset/Falset5_2qmd0FalseFalset3_1dhhx4http://www.welivesecurity.com/2013/05/01/mysterious-avatar-rootkit-with-api-sdk-and-yahoo-groups-for-cc-communication/
1365598262.030developingthefuture.net1c25gaDisassembling, Decompiling and Modifying executables [x-post from /r/programming]ffffdddddssss3662http://www.reddit.com/r/ReverseEngineering/comments/1c25ga/disassembling_decompiling_and_modifying/Falset5_2qmd0FalseFalset3_1c25gahttp://www.developingthefuture.net/disassembling-decompiling-and-modifying-executables/
1361687846.029mimisbrunnr.net194fci'Binary Analysis' Isn'trolfr35610http://www.reddit.com/r/ReverseEngineering/comments/194fci/binary_analysis_isnt/Falset5_2qmd0FalseFalset3_194fcihttp://www.mimisbrunnr.net/~munin/blog/binary-analysis-isnt.html
1353900245.028pythonarsenal.erpscan.com13skhnPython arsenal for REigor_sk3571http://www.reddit.com/r/ReverseEngineering/comments/13skhn/python_arsenal_for_re/Falset5_2qmd0FalseFalset3_13skhnhttp://pythonarsenal.erpscan.com/
1352132705.029lock.cmpxchg8b.com12o87iSophail: Applied attacks against Sophos Antivirus [PDF]rolfr3893http://www.reddit.com/r/ReverseEngineering/comments/12o87i/sophail_applied_attacks_against_sophos_antivirus/Falset5_2qmd0FalseFalset3_12o87ihttps://lock.cmpxchg8b.com/sophailv2.pdf
1348169595.030github.com107hp7The source code for ROPC, a return-oriented-programming compiler (based upon CMU's BAP)rolfr3665http://www.reddit.com/r/ReverseEngineering/comments/107hp7/the_source_code_for_ropc_a/Falset5_2qmd0FalseFalset3_107hp7https://github.com/pakt/ropc
1347154390.028self.ReverseEngineeringzkzaeHelp parsing raw binary data from magnetic credit card strip?IanCormac36816http://www.reddit.com/r/ReverseEngineering/comments/zkzae/help_parsing_raw_binary_data_from_magnetic_credit/I recently got one of those nifty Square credit card readers for iPhone (they're free) that allow you to use your iDevice as a credit card point of sale device. What's great is that these devices are super simple; just a coil and a resistor that go to the iPhone's microphone line. The movement of the credit card induces a current in the coil, which gets picked up by the iPhone.Now, my Macbook uses the same microphone setup, so I was able to record the credit card swipe onto my computer. Looking at the waveform, it's easy to see the binary data. I wrote some sweet code that automatically detects the 'bitrate' (which can change depending on swipe speed) and converts the audio data to binary, as well as some other nifty stuff. As far as I can tell, my code works very well. The results correspond with what I see in audacity. There is only minimal error in between swipes (which would probably be fixed by error checking algorithms in a real reader, or maybe more complex sampling algorithms)Even when I swipe different cards and do a visual diff of the results, I can see that there are big sections of data that look exactly the same.What I noticed was that the similarities in the data from different cards occur in multiples of 7 bits. This leads me to believe that I am reading track 1 of the card, which uses the DEC SIXBIT + odd parity format. However, the 7-bit samples I'm picking up don't seem to be of a consistent parity; some are even, some are odd. Track 1 is supposed to be odd parity. I tried shifting all 7-bit values by 1-6 bits (in case I dropped some bits somewhere), but this still didn't make it proper parity.I also tried searching for individual letters (from my name), but I could not find some of them, and none of them in order. Again, I also tried shifting all 7-bit values. Also tried flipping byte order, polarity, etc. but with no success.So, TL;DR**I think I'm getting accurate binary data from a credit card, but it doesn't seem to match up to what wikipedia says should be there.**Anyone have any advice or experience?Also, I'm not trying to be a credit card skimmer or anything; If I wanted to, I already have working card reader equipment. This is just an attempt to make a very cheap POS platform on a normal computer or a raspberry pi or something.**EDIT: Looks like the square readers might have recently been given built-in encryption hardware. Thanks for the tip torvold. I will take a look into that.**It looks like there is some juicy microcontroller business going on in the Square readers now, which explains why my received data is not at all what I expected. The encryption being used doesn't seem to be very strong (extremely low or no cascade effect, very small sub-byte repetition, and low entropy of approx. 5.5 bits per byte). This is turning out more interesting than I thought. **EDIT 2/3: I am making some good headway with the audio port protocol. I've figured out the encoding scheme, and have figured out how to get good old 8-bit byte data from it. I have some theories to test, but it does look like the credit card data is encrypted, with what may be a randomly generated password. Every time I swipe the card there are a few small sections of data and one big section of data that is different. There are also a few sections that stay the same for any given card, so I know I'm reading it correctly. Anyway, it looks like some card details are sent cleartext, some encrypted. Figuring out the encryption is on the todo list.**Falset5_2qmd01347401480.0Truet3_zkzaehttp://www.reddit.com/r/ReverseEngineering/comments/zkzae/help_parsing_raw_binary_data_from_magnetic_credit/
1343957023.028exploit-db.comxlhivLinux Nvidia driver privilege escalation PoC: virvdova3578http://www.reddit.com/r/ReverseEngineering/comments/xlhiv/linux_nvidia_driver_privilege_escalation_poc/Falset5_2qmd0FalseFalset3_xlhivhttp://www.exploit-db.com/exploits/20201/
1343766325.027blog.lse.epita.frxgufdUsing SAT and SMT to defeat simple hashing algorithmsrolfr34711http://www.reddit.com/r/ReverseEngineering/comments/xgufd/using_sat_and_smt_to_defeat_simple_hashing/Falset5_2qmd0FalseFalset3_xgufdhttp://blog.lse.epita.fr/articles/24-using-sat-and-smt-to-defeat-simple-hashing-algorit.html
1341664746.029hooked-on-mnemonics.blogspot.dew6ch1Automated Generic Function Naming in IDAnullandnull3341http://www.reddit.com/r/ReverseEngineering/comments/w6ch1/automated_generic_function_naming_in_ida/Falset5_2qmd0FalseFalset3_w6ch1http://hooked-on-mnemonics.blogspot.de/2012/06/automated-generic-function-naming-in.html
1339265927.028thunkers.netutfumIDA Toolbag v1.0 releasedadvanced_reddit_user3684http://www.reddit.com/r/ReverseEngineering/comments/utfum/ida_toolbag_v10_released/Falset5_2qmd0FalseFalset3_utfumhttp://thunkers.net/~deft/code/toolbag/
1332926646.026pferrie.host22.comrhbu9The Ultimate Anti-Debugging Reference, by Peter Ferrie (always links to the most up to date version)QvasiModo3480http://www.reddit.com/r/ReverseEngineering/comments/rhbu9/the_ultimate_antidebugging_reference_by_peter/Falset5_2qmd0FalseFalset3_rhbu9http://pferrie.host22.com/papers/antidebug.pdf
1322499042.028self.ReverseEngineeringms4ypIAmA request: F-Secure employee attempting to download bitcoin walletsFellowsOfData492120http://www.reddit.com/r/ReverseEngineering/comments/ms4yp/iama_request_fsecure_employee_attempting_to/193.110.109.30 - - [09/Nov/2011:07:17:54 +0200] 'GET /wallet.dat HTTP/1.0' 404 410 '-' 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.874.106 Safari/535.2'Falset5_2qmd0FalseTruet3_ms4yphttp://www.reddit.com/r/ReverseEngineering/comments/ms4yp/iama_request_fsecure_employee_attempting_to/
1319444492.032code.google.comlmxfeDECAC - a high level assembly languagewishi3975http://www.reddit.com/r/ReverseEngineering/comments/lmxfe/decac_a_high_level_assembly_language/Falset5_2qmd0FalseFalset3_lmxfehttp://code.google.com/p/decac/
1317826238.027blog.rewolf.pll1qynWindows SuperFetch file format - partial specificationemulb3250http://www.reddit.com/r/ReverseEngineering/comments/l1qyn/windows_superfetch_file_format_partial/Falset5_2qmd0FalseFalset3_l1qynhttp://blog.rewolf.pl/blog/?p=214
1316744383.030devttys0.comkom0aModifying the DD-WRT GUIcrudd3334http://www.reddit.com/r/ReverseEngineering/comments/kom0a/modifying_the_ddwrt_gui/Falset5_2qmd0FalseFalset3_kom0ahttp://www.devttys0.com/2011/09/modifying-the-dd-wrt-gui/
1311629110.027hex-rays.comizjqjIDA Pro Shortcuts [PDF]3032http://www.reddit.com/r/ReverseEngineering/comments/izjqj/ida_pro_shortcuts_pdf/Falset5_2qmd0FalseFalset3_izjqjhttp://www.hex-rays.com/idapro/freefiles/IDA_Pro_Shortcuts.pdf
1310592930.028wiki.thc.orgiotmiHacking Vodafone Sure Signal (UMTS Femto cell)wtbw30213http://www.reddit.com/r/ReverseEngineering/comments/iotmi/hacking_vodafone_sure_signal_umts_femto_cell/Falset5_2qmd0FalseFalset3_iotmihttp://wiki.thc.org/vodafone
1306028337.028archive.cert.uni-stuttgart.dehh17tLet's have fun with EICAR test file5d41402abc4b2a76b9713355http://www.reddit.com/r/ReverseEngineering/comments/hh17t/lets_have_fun_with_eicar_test_file/Falset5_2qmd0FalseFalset3_hh17thttp://archive.cert.uni-stuttgart.de/bugtraq/2003/06/msg00251.html
1305838986.028docs.google.comhfcpdAnti-Debugging - A Developers Viewsanitybit3793http://www.reddit.com/r/ReverseEngineering/comments/hfcpd/antidebugging_a_developers_view/Falset5_2qmd0FalseFalset3_hfcpdhttps://docs.google.com/gview?url=https%3A%2F%2Fwww.veracode.com%2Fimages%2Fpdf%2Fwhitepaper_antidebugging.pdf&pli=1
1301845714.030mirror.fem-net.deghod427c3 Videos mirror - schedule here -> http://bit.ly/gIQOWLdigduggg3331http://www.reddit.com/r/ReverseEngineering/comments/ghod4/27c3_videos_mirror_schedule_here_httpbitlygiqowl/Falset5_2qmd0FalseFalset3_ghod4http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/
1294702993.028self.ReverseEngineeringezuulFour job openings for malware analysis at Microsoftinfosec_jobs3354http://www.reddit.com/r/ReverseEngineering/comments/ezuul/four_job_openings_for_malware_analysis_at/If you are interested in applying your reverse engineer skills to malware analysis, there are 4 openings in the Microsoft antivirus research and response team. Locations are in Vancouver, Canada and Redmond, USA. If you are too lazy to click the URLs, send your questions/cv to bda@microsoft.com (even though he does not work on the antivirus team).Vancouver, CAhttps://careers.microsoft.com/JobDetails.aspx?ss=&pg=0&so=&rw=1&jid=33176&jlang=ENhttps://careers.microsoft.com/JobDetails.aspx?ss=&pg=0&so=&rw=1&jid=33180&jlang=ENRedmond, USAhttps://careers.microsoft.com/JobDetails.aspx?ss=&pg=0&so=&rw=1&jid=33188&jlang=ENhttps://careers.microsoft.com/JobDetails.aspx?ss=&pg=0&so=&rw=1&jid=33187&jlang=ENFalset5_2qmd0FalseTruet3_ezuulhttp://www.reddit.com/r/ReverseEngineering/comments/ezuul/four_job_openings_for_malware_analysis_at/
1289582228.030woodmann.come57mgSuper secret AMD debugging mode slashdotts Woodmann :) [try harder]wishi3553http://www.reddit.com/r/ReverseEngineering/comments/e57mg/super_secret_amd_debugging_mode_slashdotts/Falset5_2qmd0FalseFalset3_e57mghttp://www.woodmann.com/collaborative/knowledge/index.php/Super-secret_debug_capabilities_of_AMD_processors_!
1255872734.030mtc.sri.com9v857Conficker C P2P Protocol and Implementationwtbw3220http://www.reddit.com/r/ReverseEngineering/comments/9v857/conficker_c_p2p_protocol_and_implementation/Falset5_2qmd0FalseFalset3_9v857http://mtc.sri.com/Conficker/P2P/index.html
1252561092.027blog.reddit.com9j2ftOver in /r/TreasureMaster, we've got a cool (at least I think so) reverse engineering project going on. We would definitely appreciate any help /r/ReverseEngineering wanted to send our way.raldi3253http://www.reddit.com/r/ReverseEngineering/comments/9j2ft/over_in_rtreasuremaster_weve_got_a_cool_at_least/Falset5_2qmd0FalseFalset3_9j2fthttp://blog.reddit.com/2009/09/help-reddit-hack-worlds-worst-nintendo.html
1244057697.027news.ycombinator.com8pjqrHow I Hacked Hacker Newsrolfr3470http://www.reddit.com/r/ReverseEngineering/comments/8pjqr/how_i_hacked_hacker_news/Falset5_2qmd0FalseFalset3_8pjqrhttp://news.ycombinator.com/item?id=639976
1241089090.030zairon.wordpress.com8gpviMalware able to infect only right handed peoplecavedave3331http://www.reddit.com/r/ReverseEngineering/comments/8gpvi/malware_able_to_infect_only_right_handed_people/Falset5_2qmd0FalseFalset3_8gpvihttp://zairon.wordpress.com/2008/06/21/malware-able-to-infect-only-right-handed-people/
1240180388.028web.archive.org8dqm4So You Want To Be a Hacker? Part IV: Compression Formatsrolfr2912http://www.reddit.com/r/ReverseEngineering/comments/8dqm4/so_you_want_to_be_a_hacker_part_iv_compression/Falset5_2qmd0FalseFalset3_8dqm4http://web.archive.org/web/20080103192612/sekai.insani.org/archives/24
1374612535.025vupen.com1iwr0bVUPEN Vulnerability Research Blog - Advanced Exploitation of Windows Kernel Privilege Escalation (CVE-2013-3660 / MS13-053)rolfr3381http://www.reddit.com/r/ReverseEngineering/comments/1iwr0b/vupen_vulnerability_research_blog_advanced/Falset5_2qmd0FalseFalset3_1iwr0bhttp://www.vupen.com/blog/20130723.Advanced_Exploitation_Windows_Kernel_Win32k_EoP_MS13-053.php
1374581801.027amazon.com1ivoilPractical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools (pre-order, not yet published)pwnwaffe32510http://www.reddit.com/r/ReverseEngineering/comments/1ivoil/practical_reverse_engineering_using_x86_x64_arm/Falset5_2qmd0FalseFalset3_1ivoilhttp://www.amazon.com/Practical-Reverse-Engineering-Windows-Reversing/dp/1118787315/
1373412126.026self.ReverseEngineering1hywvr/r/ReverseEngineering's Q3 2013 Hiring Threadrolfr35919http://www.reddit.com/r/ReverseEngineering/comments/1hywvr/rreverseengineerings_q3_2013_hiring_thread/If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s). Failure to provide the details in the following format and/or answer questions will result in the post's removal.Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/RolfRolles/status/354743367126626305) couldn't hurt.Falset5_2qmd01373412412.0Truet3_1hywvrhttp://www.reddit.com/r/ReverseEngineering/comments/1hywvr/rreverseengineerings_q3_2013_hiring_thread/
1372753627.027twistedoakstudios.com1hhi7bBreaking a Toy Hash Functionrolfr3030http://www.reddit.com/r/ReverseEngineering/comments/1hhi7b/breaking_a_toy_hash_function/Falset5_2qmd0FalseFalset3_1hhi7bhttp://twistedoakstudios.com/blog/Post4706_breaking-a-toy-hash-function
1372432049.027blog.rewolf.pl1h92ckWoW64 internals: Tale of GetSystemFileCacheSizeemulb3140http://www.reddit.com/r/ReverseEngineering/comments/1h92ck/wow64_internals_tale_of_getsystemfilecachesize/Falset5_2qmd0FalseFalset3_1h92ckhttp://blog.rewolf.pl/blog/?p=621
1363869186.025cansecwest.com1aq8j8Analysis of a Windows Kernel Vulnerability: From Espionage to Criminal Use [PDF]nullandnull36115http://www.reddit.com/r/ReverseEngineering/comments/1aq8j8/analysis_of_a_windows_kernel_vulnerability_from/Falset5_2qmd0FalseFalset3_1aq8j8http://cansecwest.com/slides/2013/Analysis%20of%20a%20Windows%20Kernel%20Vuln.pdf
1362412181.025reddit.com19n4ul/r/rootkit - A new subreddit for technical discussion about rootkit research and developmentstormehh37120http://www.reddit.com/r/ReverseEngineering/comments/19n4ul/rrootkit_a_new_subreddit_for_technical_discussion/Falset5_2qmd0FalseFalset3_19n4ulhttp://www.reddit.com/r/rootkit/
1362326483.028righto.com19kvyvThe 8085's register filekasbah3240http://www.reddit.com/r/ReverseEngineering/comments/19kvyv/the_8085s_register_file/Falset5_2qmd0FalseFalset3_19kvyvhttp://www.righto.com/2013/03/register-file-8085.html
1355843719.027youtube.com151y9jFelix 'FX' Lindner: Targeted Industrial Control System Attacks - Lessons from Stuxnet (video)samcrem37100http://www.reddit.com/r/ReverseEngineering/comments/151y9j/felix_fx_lindner_targeted_industrial_control/Falset5_2qmd0FalseFalset3_151y9jhttps://www.youtube.com/watch?v=GVi_ZW-1bNg&list=UUk3dh4D63LHX6Sdagacyamw&index=23
1354788283.027digitalinvestigation.wordpress.com14dlpvReverse Engineering Evernote Penultimate (or: When is a picture not a picture?)polar3473http://www.reddit.com/r/ReverseEngineering/comments/14dlpv/reverse_engineering_evernote_penultimate_or_when/Falset5_2qmd0FalseFalset3_14dlpvhttp://digitalinvestigation.wordpress.com/2012/12/05/reverse-engineering-evernote-penultimate-or-when-is-a-picture-not-a-picture/
1353945389.030reddit.com13te5f/r/vrd/: Vulnerability Research and Development - A new moderated subreddit for high quality resources on technical topics related to bugs, vulnerabilities, and exploits in computer systems.HockeyInJune44140http://www.reddit.com/r/ReverseEngineering/comments/13te5f/rvrd_vulnerability_research_and_development_a_new/Falset5_2qmd0FalseFalset3_13te5fhttp://www.reddit.com/r/vrd/
1351997106.027j00ru.vexillium.org12lfpqDefeating Windows Driver Signature Enforcement #1: default driversrolfr37100http://www.reddit.com/r/ReverseEngineering/comments/12lfpq/defeating_windows_driver_signature_enforcement_1/Falset5_2qmd0FalseFalset3_12lfpqhttp://j00ru.vexillium.org/?p=1169
1351405453.028j00ru.vexillium.org127khfIntroducing the USB Stick of Death j00ru//vx tech blogrolfr40122http://www.reddit.com/r/ReverseEngineering/comments/127khf/introducing_the_usb_stick_of_death_j00ruvx_tech/Falset5_2qmd0FalseFalset3_127khfhttp://j00ru.vexillium.org/?p=1272
1351362897.028blog.cryptographyengineering.com126l0pCross-VM timing attacksigor_sk3350http://www.reddit.com/r/ReverseEngineering/comments/126l0p/crossvm_timing_attacks/Falset5_2qmd0FalseFalset3_126l0phttp://blog.cryptographyengineering.com/2012/10/attack-of-week-cross-vm-timing-attacks.html
1345933064.028symantec.comytq8yW32.Changeup: How the Worm Was Created [PDF]gljiva3020http://www.reddit.com/r/ReverseEngineering/comments/ytq8y/w32changeup_how_the_worm_was_created_pdf/Falset5_2qmd0FalseFalset3_ytq8yhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_changeup_how_the_worm_was_created.pdf
1345781009.027erpscan.comyqizgPython arsenal for reverse engineering [PDF]rolfr37102http://www.reddit.com/r/ReverseEngineering/comments/yqizg/python_arsenal_for_reverse_engineering_pdf/Falset5_2qmd0FalseFalset3_yqizghttp://erpscan.com/wp-content/uploads/2012/06/Python-arsenal-for-RE-1.1.pdf
1345458163.026blog.praty.netyimgqLocating binary modifications using vimdiffdefragger3487http://www.reddit.com/r/ReverseEngineering/comments/yimgq/locating_binary_modifications_using_vimdiff/Falset5_2qmd0FalseFalset3_yimgqhttp://blog.praty.net/?p=102
1332795466.027self.ReverseEngineeringrerciHow do I go about unwinding an encrypted network protocol?borick34712http://www.reddit.com/r/ReverseEngineering/comments/rerci/how_do_i_go_about_unwinding_an_encrypted_network/Falset5_2qmd0FalseTruet3_rercihttp://www.reddit.com/r/ReverseEngineering/comments/rerci/how_do_i_go_about_unwinding_an_encrypted_network/
1324451538.028cr0.orgnl08t'This resulted in perhaps our most critical discovery, remote ring0 code execution when a user visits a hostile website' [2009]yuhong3350http://www.reddit.com/r/ReverseEngineering/comments/nl08t/this_resulted_in_perhaps_our_most_critical/Falset5_2qmd0FalseFalset3_nl08thttps://www.cr0.org/paper/to-jt-party-at-ring0.pdf
1320666043.026self.ReverseEngineeringm3f45What is the state of the art in decompilers?ReturningTarzan31528http://www.reddit.com/r/ReverseEngineering/comments/m3f45/what_is_the_state_of_the_art_in_decompilers/I'm thinking especially of decompilers for Win32 executables, e.g. projects like [Boomerang](http://boomerang.sourceforge.net/), although that particular one seems to have died in 2006.Falset5_2qmd0FalseTruet3_m3f45http://www.reddit.com/r/ReverseEngineering/comments/m3f45/what_is_the_state_of_the_art_in_decompilers/
1317241229.027suif.stanford.edukugb0Program Analysis and Optimizationsdigduggg3144http://www.reddit.com/r/ReverseEngineering/comments/kugb0/program_analysis_and_optimizations/Falset5_2qmd0FalseFalset3_kugb0http://suif.stanford.edu/~courses/cs243/
1308847120.027code.google.comi7a60peepdf - PDF analysis and creation/modification tool3142http://www.reddit.com/r/ReverseEngineering/comments/i7a60/peepdf_pdf_analysis_and_creationmodification_tool/Falset5_2qmd0FalseFalset3_i7a60http://code.google.com/p/peepdf/
1307899827.028malwarereversing.wordpress.comhxv4mCrackmes.de mirrortinou32410http://www.reddit.com/r/ReverseEngineering/comments/hxv4m/crackmesde_mirror/Falset5_2qmd0FalseFalset3_hxv4mhttps://malwarereversing.wordpress.com/2011/05/13/crackmes-de-mirror/
1305128985.027code.google.comh9079BinVis - Binary File Visualizationquitelikeme3147http://www.reddit.com/r/ReverseEngineering/comments/h9079/binvis_binary_file_visualization/Falset5_2qmd0FalseFalset3_h9079http://code.google.com/p/binvis/
1303855491.027code.google.comgy46jpefile is a multi-platform Python module to read and work with Portable Executable (aka PE) files. Most of the information in the PE Header is accessible, as well as all the sections, section's information and data. mauvehead33611http://www.reddit.com/r/ReverseEngineering/comments/gy46j/pefile_is_a_multiplatform_python_module_to_read/Falset5_2qmd0FalseFalset3_gy46jhttp://code.google.com/p/pefile/
1303509176.026papers.filegazebo.comgv8unA Refined Decompiler to Generate C Code with High Readability [PDF]rolfr2937http://www.reddit.com/r/ReverseEngineering/comments/gv8un/a_refined_decompiler_to_generate_c_code_with_high/Falset5_2qmd0FalseFalset3_gv8unhttp://papers.filegazebo.com/A Refined Decompiler to Generate C Code with High Readability.pdf
1299469134.027codeproject.comfyrh3An Anti-Reverse Engineering Guide (2008)FourFingeredMartian3039http://www.reddit.com/r/ReverseEngineering/comments/fyrh3/an_antireverse_engineering_guide_2008/Falset5_2qmd0FalseFalset3_fyrh3http://www.codeproject.com/KB/security/AntiReverseEngineering.aspx?display=Print
1285275774.027eset.comdi0s1Stuxnet under the microscope :: PDFpsed3141http://www.reddit.com/r/ReverseEngineering/comments/di0s1/stuxnet_under_the_microscope_pdf/Falset5_2qmd0FalseFalset3_di0s1http://www.eset.com/resources/white-papers/Stuxnet_Under_the_Microscope.pdf
1283030564.027ps3hax.netd6o4vPSJailbreak Reverse Engineeredwtbw3256http://www.reddit.com/r/ReverseEngineering/comments/d6o4v/psjailbreak_reverse_engineered/Falset5_2qmd0FalseFalset3_d6o4vhttp://www.ps3hax.net/2010/08/ps-jailbreak-reverse-engineered/
1271701465.026msdn.microsoft.combt7mzAnnotated x86 Disassembly2931http://www.reddit.com/r/ReverseEngineering/comments/bt7mz/annotated_x86_disassembly/Falset5_2qmd0FalseFalset3_bt7mzhttp://msdn.microsoft.com/en-us/library/ff538086%28VS.85%29.aspx
1374451990.025jbremer.org1is2weAutomated Deobfuscation of Android Applications by Jurriaan Bremer [PDF]turnersr3276http://www.reddit.com/r/ReverseEngineering/comments/1is2we/automated_deobfuscation_of_android_applications/Falset5_2qmd0FalseFalset3_1is2wehttp://jbremer.org/wp-posts/athcon.pdf
1373389428.023jdege.us1hy184An Intro to Crypto Programming using Python1107d736130http://www.reddit.com/r/ReverseEngineering/comments/1hy184/an_intro_to_crypto_programming_using_python/Falset5_2qmd0FalseFalset3_1hy184http://jdege.us/crypto-python/index.html
1372493352.028recon.cx1havtfRecon 2013 slidessimpleuser2912http://www.reddit.com/r/ReverseEngineering/comments/1havtf/recon_2013_slides/Falset5_2qmd0FalseFalset3_1havtfhttp://recon.cx/2013/slides/
1371545240.026phenoelit.org1gkoy5Cisco in the Sky with Diamonds [PDF]rolfr2713http://www.reddit.com/r/ReverseEngineering/comments/1gkoy5/cisco_in_the_sky_with_diamonds_pdf/Falset5_2qmd0FalseFalset3_1gkoy5http://www.phenoelit.org/stuff/CiscoInTheSkyWithDiamonds.pdf
1369235595.028data.proidea.org.pl1eu668Building Custom Disassemblers - Instruction Set Reverse Engineering - [PDF]nullandnull3241http://www.reddit.com/r/ReverseEngineering/comments/1eu668/building_custom_disassemblers_instruction_set/Falset5_2qmd0FalseFalset3_1eu668http://data.proidea.org.pl/confidence/9edycja/materialy/prezentacje/FX.pdf
1367722527.026self.ReverseEngineering1dpovu64 bit debuggers for windows. Where they at?Av3ragej0e34816http://www.reddit.com/r/ReverseEngineering/comments/1dpovu/64_bit_debuggers_for_windows_where_they_at/Other than windbg and VisualDux (which works, but is kinda buggy) what are some decent 64 bit debuggers for windows? I've been holding my breath for olly / immunity for years, but no dice.Falset5_2qmd0FalseTruet3_1dpovuhttp://www.reddit.com/r/ReverseEngineering/comments/1dpovu/64_bit_debuggers_for_windows_where_they_at/
1365732400.028pastebin.com1c6gz1Opensourcing 'Symbolic Exploit Assistant' (SEA) and asking for collaborationgalapag030218http://www.reddit.com/r/ReverseEngineering/comments/1c6gz1/opensourcing_symbolic_exploit_assistant_sea_and/Falset5_2qmd0FalseFalset3_1c6gz1http://pastebin.com/wR9sX0r1
1354390227.025pastebin.com1444odI just came across this obfuscated JavaScript malwareskeeto38137http://www.reddit.com/r/ReverseEngineering/comments/1444od/i_just_came_across_this_obfuscated_javascript/Falset5_2qmd0FalseFalset3_1444odhttp://pastebin.com/Eqn7i4d7
1349281665.024gdtr.wordpress.com10vr0cDeCV — a decompiler for Code Virtualizer by Oreans « GDTRMost_Likely_Drunk3171http://www.reddit.com/r/ReverseEngineering/comments/10vr0c/decv_a_decompiler_for_code_virtualizer_by_oreans/Falset5_2qmd0FalseFalset3_10vr0chttp://gdtr.wordpress.com/2012/10/03/decv-a-decompiler-for-code-virtualizer-by-oreans/
1348297876.027wingolog.org10aflnA closer look at crankshaft, v8's optimizing compilerrolfr2920http://www.reddit.com/r/ReverseEngineering/comments/10afln/a_closer_look_at_crankshaft_v8s_optimizing/Falset5_2qmd0FalseFalset3_10aflnhttp://wingolog.org/archives/2011/08/02/a-closer-look-at-crankshaft-v8s-optimizing-compiler
1348080204.025blog.ptsecurity.com105ddmBypassing Intel SMEP on Windows 8 x64 Using Return-oriented Programmingrolfr3050http://www.reddit.com/r/ReverseEngineering/comments/105ddm/bypassing_intel_smep_on_windows_8_x64_using/Falset5_2qmd0FalseFalset3_105ddmhttp://blog.ptsecurity.com/2012/09/bypassing-intel-smep-on-windows-8-x64.html
1343315898.027blog.rewolf.plx6y7jSolving gim913′s KeygenMe#01emulb2810http://www.reddit.com/r/ReverseEngineering/comments/x6y7j/solving_gim913s_keygenme01/Falset5_2qmd0FalseFalset3_x6y7jhttp://blog.rewolf.pl/blog/?p=383
1341053863.028cert.plvu61sAnalysis of a recent Facebook malwareienvyparanoids3570http://www.reddit.com/r/ReverseEngineering/comments/vu61s/analysis_of_a_recent_facebook_malware/Falset5_2qmd0FalseFalset3_vu61shttp://www.cert.pl/news/5587/langswitch_lang/en
1337818719.026abad1dea.tumblr.comu1wliAnalyzing Binaries with Hopper’s Decompilersanitybit3481http://www.reddit.com/r/ReverseEngineering/comments/u1wli/analyzing_binaries_with_hoppers_decompiler/Falset5_2qmd0FalseFalset3_u1wlihttp://abad1dea.tumblr.com/post/23487860422/analyzing-binaries-with-hoppers-decompiler
1328970734.025gmr.crypto.rub.depkrmhReversing Satellite Phones Firmwarecwillems3491http://www.reddit.com/r/ReverseEngineering/comments/pkrmh/reversing_satellite_phones_firmware/Falset5_2qmd0FalseFalset3_pkrmhhttp://gmr.crypto.rub.de/paper/paper-1.pdf
1327751293.028openrce.orgp0ev6Windows Memory Layout Cheet Sheet - User and Kernel Spaceswishi3241http://www.reddit.com/r/ReverseEngineering/comments/p0ev6/windows_memory_layout_cheet_sheet_user_and_kernel/Falset5_2qmd0FalseFalset3_p0ev6http://www.openrce.org/reference_library/files/reference/Windows%20Memory%20Layout,%20User-Kernel%20Address%20Spaces.pdf
1319983934.027darklapu.blogspot.comlu2z2OS X backdoor Olyx ReversingRobinVP3033http://www.reddit.com/r/ReverseEngineering/comments/lu2z2/os_x_backdoor_olyx_reversing/Falset5_2qmd0FalseFalset3_lu2z2http://darklapu.blogspot.com/2011/10/os-x-backdoor-olyx.html
1315425276.027eli.thegreenplace.netk7xsxStack frame layout on x86-645d41402abc4b2a76b9712920http://www.reddit.com/r/ReverseEngineering/comments/k7xsx/stack_frame_layout_on_x8664/Falset5_2qmd0FalseFalset3_k7xsxhttp://eli.thegreenplace.net/2011/09/06/stack-frame-layout-on-x86-64/
1312546523.026lock.cmpxchg8b.comj9sg7Sophail: A Critical Analysis of Sophos Antivirus [PDF]dimonio35941http://www.reddit.com/r/ReverseEngineering/comments/j9sg7/sophail_a_critical_analysis_of_sophos_antivirus/Falset5_2qmd0FalseFalset3_j9sg7http://lock.cmpxchg8b.com/Sophail.pdf
1310752269.025radare.orgiqlloRadare2-0.8 Released :: The Open-Source Reverse Engineering Frameworkvext013271http://www.reddit.com/r/ReverseEngineering/comments/iqllo/radare208_released_the_opensource_reverse/Falset5_2qmd0FalseFalset3_iqllohttp://radare.org/y/
1303342670.028hexblog.comguw1oHex-Rays is hiringrolfr2911http://www.reddit.com/r/ReverseEngineering/comments/guw1o/hexrays_is_hiring/Falset5_2qmd0FalseFalset3_guw1ohttp://www.hexblog.com/?p=290
1295609730.027self.ReverseEngineeringf6f5sHow do I get started in vulnerability research?quitelikeme29217http://www.reddit.com/r/ReverseEngineering/comments/f6f5s/how_do_i_get_started_in_vulnerability_research/I'd really like to get started in vuln research as I'd love to write my own first exploits. My problem is, there don't seem to be too much papers/articles that help you get started.Don't get me wrong, there are of course lots and lots of papers/articles that explain how buffer overflows work, how format string vulns work, how to bypass ASLR or maybe DEP etc. The thing is, these are technical details and I've probably read 400 papers on how to overwrite the return address in the numerous exploitation papers/tutorials but this is not what I'm interested in. I've done reverse engineering and understand how BO and the rest of the usual suspects work, but I don't know how to do anything with my knowledge.Is there anything that might go into detail regarding the actual workflow? I've read others sometimes grep sources for something, or maybe people actually read the whole source, or do people stumble upon most of the vulns by accident? Is there something that might kickstart my own research, maybe some paper/video of another beginner that explains how he found an actual vulnerablity (maybe wrote a fuzzer)?My try at an analogy: It seems like everyone is teaching me how to build a motorcycle, yet no one thinks about telling me how to race one, but in the end, this is what matters and I'm having a hard time applying all the theoretical things I know.Maybe someone has some links to hook me up, much appreciated!Edit: What triggered the post was the recent article about beginner exploitation of MiniShare in this subbredit. It's typical, I'm told 'Go grab MiniShare X.XX', it's vulnerable, see advisory ABC, now send it some bug input, overwrite stack, done. First exploit, yay..Falset5_2qmd0TrueTruet3_f6f5shttp://www.reddit.com/r/ReverseEngineering/comments/f6f5s/how_do_i_get_started_in_vulnerability_research/
1292431559.025blogs.technet.comemaktA Bluescreen By Any Other Color - Mark Russinovich 3162http://www.reddit.com/r/ReverseEngineering/comments/emakt/a_bluescreen_by_any_other_color_mark_russinovich/Falset5_2qmd0FalseFalset3_emakthttp://blogs.technet.com/b/markrussinovich/archive/2010/12/14/3374820.aspx
1291730303.025travisgoodspeed.blogspot.comehndtKnitting machine hacked to print video game screens.s7ephen3051http://www.reddit.com/r/ReverseEngineering/comments/ehndt/knitting_machine_hacked_to_print_video_game/Falset5_2qmd0FalseFalset3_ehndthttp://travisgoodspeed.blogspot.com/2010/12/hacking-knitting-machines-keypad.html
1271874335.026xrel.tobu8g6Now it's official: SKIDROW released a cracked Assassin's Creed 2 (uses the new UbiSoft DRM)quitelikeme2824http://www.reddit.com/r/ReverseEngineering/comments/bu8g6/now_its_official_skidrow_released_a_cracked/Falset5_2qmd0FalseFalset3_bu8g6http://www.xrel.to/game-nfo/189535/Assassins-Creed-II-SKIDROW.html
1270578543.026blog.ksplice.combn90tKsplice - Hello from a libc-free world! (Part 2)__y2930http://www.reddit.com/r/ReverseEngineering/comments/bn90t/ksplice_hello_from_a_libcfree_world_part_2/Falset5_2qmd0FalseFalset3_bn90thttp://blog.ksplice.com/2010/04/libc-free-world-2/
1252428587.025securitytube.net9ihrpSoftware Cracking Primer using Ollydbg and a Crackme <--- Video. Nice tute!l33t-hax0r3380http://www.reddit.com/r/ReverseEngineering/comments/9ihrp/software_cracking_primer_using_ollydbg_and_a/Falset5_2qmd0FalseFalset3_9ihrphttp://securitytube.net/Software-Cracking-Primer-using-Ollydbg-and-a-Crackme-video.aspx
1250889361.027xbox-linux.org9cxm6Mistakes Microsoft Made in the Xbox Security Systemrolfr3258http://www.reddit.com/r/ReverseEngineering/comments/9cxm6/mistakes_microsoft_made_in_the_xbox_security/Falset5_2qmd0FalseFalset3_9cxm6http://www.xbox-linux.org/wiki/17_Mistakes_Microsoft_Made_in_the_Xbox_Security_System
1244635668.024securitytube.net8rbu6Chip Reverse Engineering (25th Chaos Communication Congress)l33t-hax0r2731http://www.reddit.com/r/ReverseEngineering/comments/8rbu6/chip_reverse_engineering_25th_chaos_communication/Falset5_2qmd0FalseFalset3_8rbu6http://securitytube.net/Chip-Reverse-Engineering-(25C3)-video.aspx
1375742494.024i.imgur.com1jrsk9Trying to pair a male 30 pin to a female USB. Need some help. Picture explains.Kwarter391522http://www.reddit.com/r/ReverseEngineering/comments/1jrsk9/trying_to_pair_a_male_30_pin_to_a_female_usb_need/Falset5_2qmd0FalseFalset3_1jrsk9http://i.imgur.com/v8nRr8o.jpg
1375203343.025pe102.corkami.com1jcwzuPE102 - a Windows executable format overview (as poster and booklet)simpleuser3383http://www.reddit.com/r/ReverseEngineering/comments/1jcwzu/pe102_a_windows_executable_format_overview_as/Falset5_2qmd0FalseFalset3_1jcwzuhttp://pe102.corkami.com
1372314838.025ho.ax1h5x8eVoltron - a hacky UI for GDBphoenix893051http://www.reddit.com/r/ReverseEngineering/comments/1h5x8e/voltron_a_hacky_ui_for_gdb/Falset5_2qmd0FalseFalset3_1h5x8ehttp://ho.ax/posts/2013/06/voltron-a-hacky-ui-for-gdb/
1371122174.024madeiracloud.com1g9f53Automatically Generate Puppet Manifests for any Machinetbronchain2952http://www.reddit.com/r/ReverseEngineering/comments/1g9f53/automatically_generate_puppet_manifests_for_any/Falset5_2qmd0FalseFalset3_1g9f53http://www.madeiracloud.com/blog/introducing-pysa-reverse-your-servers-configurations
1369778243.028acloudtree.com1f86qbHacking Java Bytecode for Programmers (Part3)1107d737918http://www.reddit.com/r/ReverseEngineering/comments/1f86qb/hacking_java_bytecode_for_programmers_part3/Falset5_2qmd0FalseFalset3_1f86qbhttp://www.acloudtree.com/yes-disassemble-with-javap-all-over-the-place-hacking-java-bytecode-for-programmers-part3/
1368542489.025self.ReverseEngineering1ebdzabasic null pointer linux kernel exploitationblahfish3499http://www.reddit.com/r/ReverseEngineering/comments/1ebdza/basic_null_pointer_linux_kernel_exploitation/I was reading a presentation on [kernel null pointer dereferences][1] and I was trying out the exercise bug1.c. I had to manually set my `vm.mmap_min_addr` to 0 using `sysctl vm.mmap_min_addr=0` and I tried to figure out kernel symbol information using root privileges. $ sudo grep prepare_kernel /proc/kallsyms c10761f0 T prepare_kernel_cred $ sudo grep commit_creds /proc/kallsyms c1075f80 T commit_credsNow I have a couple of questions at this point: - 1. `rasm2 -a x86 'call 0xc10761f0'` gives me 'e8eb6107c1'. Why is it not 'e8f06107c1'? The case is similar with the address for commit_creds. 2. When I wrote the exploit I noted that using 'e8eb6107c1' always ended up jumping to 'prepare_kernel_cred+5', on inspecting /var/log/syslog. I adjusted it to 'e8e96107c1' and it suddenly works! Here I have a couple of doubts, why am I having to adjust the address of `prepare_kernel_cred`? Also, why is it that I dont have to adjust the address of `commit_creds`I considered asking this at SO but then couldnt find an 'exploit' tag, so thought I'd post here. [1]: http://ugcs.net/~keegan/talks/kernel-exploit/talk.pdfFalset5_2qmd0FalseTruet3_1ebdzahttp://www.reddit.com/r/ReverseEngineering/comments/1ebdza/basic_null_pointer_linux_kernel_exploitation/
1367016484.026scanlime.org1d6n5wBeth Scott's Temporal Hex Dump2933http://www.reddit.com/r/ReverseEngineering/comments/1d6n5w/beth_scotts_temporal_hex_dump/Falset5_2qmd0FalseFalset3_1d6n5whttp://scanlime.org/2009/10/temporal-hex-dump/
1360690296.026blog.rewolf.pl18dxxzSolving sas0 ’s “The Game” crackme (.NET)emulb3592http://www.reddit.com/r/ReverseEngineering/comments/18dxxz/solving_sas0s_the_game_crackme_net/Falset5_2qmd0FalseFalset3_18dxxzhttp://blog.rewolf.pl/blog/?p=502
1357828633.026github.com16bc9tBinSlayer: Fast comparison of binary executablessamcrem33712http://www.reddit.com/r/ReverseEngineering/comments/16bc9t/binslayer_fast_comparison_of_binary_executables/Falset5_2qmd0FalseFalset3_16bc9thttps://github.com/MartialB/BinSlayer
1353268371.024waleedassar.blogspot.com13es6wVirtualBox CPUID Discrepancywaliedassar3392http://www.reddit.com/r/ReverseEngineering/comments/13es6w/virtualbox_cpuid_discrepancy/Falset5_2qmd0FalseFalset3_13es6whttp://waleedassar.blogspot.com/2012/11/virtualbox-cpuid-discrepancy.html
1350152926.026conference.hitb.org11f9joHack in the Box 2012 Kuala Lumpur presentationsigor_sk2825http://www.reddit.com/r/ReverseEngineering/comments/11f9jo/hack_in_the_box_2012_kuala_lumpur_presentations/Falset5_2qmd0FalseFalset3_11f9johttp://conference.hitb.org/hitbsecconf2012kul/materials/
1349115369.026self.ReverseEngineering10rsit/r/ReverseEngineering's Q4 2012 Hiring Threadrolfr32613http://www.reddit.com/r/ReverseEngineering/comments/10rsit/rreverseengineerings_q4_2012_hiring_thread/If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s). Failure to provide the details in the following format and/or answer questions will result in the post's removal.Please elucidate along the following lines:* Describe the position as thoroughly as possible.* Where is the position located? Is telecommuting permissible? Does the company provide relocation? Is it mandatory that the applicant be a citizen of the country in which the position is located?* If applicable, what is the education / certification requirement?* Is a security clearance required? If so, at what level?* How should candidates apply for the position?Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.If you use twitter, retweeting [this](https://twitter.com/RolfRolles/status/252834513388974081) couldn't hurt.Falset5_2qmd0FalseTruet3_10rsithttp://www.reddit.com/r/ReverseEngineering/comments/10rsit/rreverseengineerings_q4_2012_hiring_thread/
1347892665.025blog.vulnhunt.com100uy2IE execCommand fuction Use after free Vulnerability 0day Analysiscbolat3050http://www.reddit.com/r/ReverseEngineering/comments/100uy2/ie_execcommand_fuction_use_after_free/Falset5_2qmd0FalseFalset3_100uy2http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day_en/
1345480535.025timetobleed.comyj2sgRipping OAuth tokens (or other secrets) out of TweetDeck, Twitter.app, and other appspdq3050http://www.reddit.com/r/ReverseEngineering/comments/yj2sg/ripping_oauth_tokens_or_other_secrets_out_of/Falset5_2qmd0FalseFalset3_yj2sghttp://timetobleed.com/ripping-oauth-tokens-or-other-secrets-out-of-tweetdeck-twitter-app-and-other-apps/
1341368856.025self.ReverseEngineeringw0frcRFID Hack Project: Bus Ticket Systemandrepcg32739http://www.reddit.com/r/ReverseEngineering/comments/w0frc/rfid_hack_project_bus_ticket_system/Me and my friend are computer science students and we decided to work on a exciting project. We live in Portugal and our town has it's own bus system and they use RFID for the tickets (magnetic tickets were replaced recently).Our plan is to understand how this system works, what information is stored on each card and how can we hack it for learning purposes.Right now we're at information gathering stage and we need to learn everything we can before we jump right into it.**Information about the tickets**- Rechargeable (if we need more rides they recharge the ticket, we always keep the same one) -> Read/Write?**What we want**- Read and decrypt the information (all the ticket content, not just the TAG or what it might be)- Modify the information on the ticket (add more trips, valuable information the ticket might contain)- Clone a ticket**What we need to know**- How can we detect the ticket frequency?- How to know the tag (Mifare, ISO 14443, etc.) prior to buying the reader/writer?- Ignoring the frequency, using a reader can we extract all the content from the ticket with no efforts? (talking about password, encryption, etc..)- After we got the frequency, is it easier/cheaper to buy a RDIF read/writer or to build an arduino one?Hope you guys can give me some information, I've already started looking around a lot of websites and I'm doing the best research I can before starting this. Thank you!**PICS! (behind light)**http://i.imgur.com/OnR5j.jpghttp://i.imgur.com/pGIQ4.jpgAs you can see, they're pretty flexible, it's just a piece of paper------------------------------ **EDIT** ------------------------------Good news everyone! So we found out that my town's bus system publishes a monthly magazine and in one of them they explain how the system works!**Protocol:** ISO 14443B**Frequency:** 13.56MHzTag: It might be Calypso...... :(They have two types of tickets: a personal ticket, which has the name and photo of the person (for regular passengers) and a paper one (the one in the photo) for occasional passengers. Both have the same chip (and antenna) where **client data and transportation contracts are stored.****Under the Hood*** PoS: There are stores across the city where we can acquire and recharge the tickets.* Inside the bus: there's also a PoS working the same way as the stores. The on board ticketing system connects with the geo location system to acquire data about all the tickets inside that specific bus. The information acquired on board is automatically collected, over WiFi, in the central garage where the buses are stored (possibly at the end of the day) and that information is sent to the central system where all the data is processed (financial, operational, statistics..). Using the same communication method, information about rates, users etc. is sent to the on-board system.* Central System: system with high availability (24x7). The database contains all the necessary information for operational, accounting and statistic management. All the data corresponding to the transactions created from all across the ticketing network, are stored in the database where all the information can be analyzed with different purposes like client management, auditing, maintenance management, complaint management and fraud management. Falset5_2qmd01341528380.0Truet3_w0frchttp://www.reddit.com/r/ReverseEngineering/comments/w0frc/rfid_hack_project_bus_ticket_system/
1338442079.025drdobbs.comudfysThe Design of LLVMrolfr2501http://www.reddit.com/r/ReverseEngineering/comments/udfys/the_design_of_llvm/Falset5_2qmd0FalseFalset3_udfyshttp://www.drdobbs.com/architecture-and-design/240001128
1334980813.024vision.ece.ucsb.eduskul4Malware Imageslaks3163288http://www.reddit.com/r/ReverseEngineering/comments/skul4/malware_images/Falset5_2qmd0FalseFalset3_skul4http://vision.ece.ucsb.edu/~lakshman/malware_images/album/
1323478830.026self.ReverseEngineeringn6x7n.NET deobfuscator - de4dotde4dot3046http://www.reddit.com/r/ReverseEngineering/comments/n6x7n/net_deobfuscator_de4dot/This is a .NET deobfuscator. See https://github.com/0xd4d/de4dotIt supports the following .NET obfuscators:* CliSecure* Crypto Obfuscator* Dotfuscator* .NET Reactor* Eazfuscator.NET* SmartAssembly* XenocodeIt has partial support for other obfuscators, but the result might not be runnable.Depending on obfuscator, it will do one or more of the following:* Rename obfuscated symbols* Deobfuscate control flow* Decrypt strings* Decrypt and dump embedded assemblies* Decrypt resources* Decrypt methods* Fix proxy calls* Inline methods* Remove error reporting code (added exception handlers)* Restore field and method arg types* Get rid of added obfuscator classes and methodsFalset5_2qmd0FalseTruet3_n6x7nhttp://www.reddit.com/r/ReverseEngineering/comments/n6x7n/net_deobfuscator_de4dot/
1317101684.025gdtr.wordpress.comksnqdHyperelliptic curve crypto — Dcoder's keygenme #231576443823052http://www.reddit.com/r/ReverseEngineering/comments/ksnqd/hyperelliptic_curve_crypto_dcoders_keygenme_2/Falset5_2qmd0FalseFalset3_ksnqdhttps://gdtr.wordpress.com/2011/09/26/hyperelliptic-curve-crypto-dcoders-keygenme-2/
1317031413.026slideshare.netkrp0yDefeating x64: Modern Trends of Kernel-Mode Rootkitsnewgre2930http://www.reddit.com/r/ReverseEngineering/comments/krp0y/defeating_x64_modern_trends_of_kernelmode_rootkits/Falset5_2qmd0FalseFalset3_krp0yhttp://www.slideshare.net/matrosov/defeating-x64-modern-trends-of-kernelmode-rootkits
1315496596.026blogs.norman.comk8wtsMebromi, a bios-flashing trojan Norman Blogswishi3046http://www.reddit.com/r/ReverseEngineering/comments/k8wts/mebromi_a_biosflashing_trojan_norman_blogs/Falset5_2qmd0FalseFalset3_k8wtshttp://blogs.norman.com/2011/malware-detection-team/mebromi-a-bios-flashing-trojan
1313916644.025github.comjpj6fTools for Firmware Reversingsanitybit3052http://www.reddit.com/r/ReverseEngineering/comments/jpj6f/tools_for_firmware_reversing/Falset5_2qmd0FalseFalset3_jpj6fhttps://github.com/fwhacking
1308424891.025i.imgur.comi33e9Cross-post from /r/gaming - Blizzard looking for anti-cheat engineerquitelikeme29410http://www.reddit.com/r/ReverseEngineering/comments/i33e9/crosspost_from_rgaming_blizzard_looking_for/Falset5_2qmd0FalseFalset3_i33e9http://i.imgur.com/wsh7G.png
1302866112.026rcejunk.blogspot.comgqnw2Shmoocon 2011 Crypto Pack Solved! And Pairings And SAGE!falso2820http://www.reddit.com/r/ReverseEngineering/comments/gqnw2/shmoocon_2011_crypto_pack_solved_and_pairings_and/Falset5_2qmd0FalseFalset3_gqnw2http://rcejunk.blogspot.com/2011/04/shmoocon-2011-crypto-pack-solved.html
1291130867.026networkworld.comedxmaFlaws in Canon image verification systemdimonio2822http://www.reddit.com/r/ReverseEngineering/comments/edxma/flaws_in_canon_image_verification_system/Falset5_2qmd0FalseFalset3_edxmahttp://www.networkworld.com/news/2010/113010-analyst-finds-flaws-in-canon.html
1290573999.027esec-lab.sogeti.comeaxhqNIC firmware rootkit. Uploaded from userspace. Has DMA and talks to the network.s7ephen2812http://www.reddit.com/r/ReverseEngineering/comments/eaxhq/nic_firmware_rootkit_uploaded_from_userspace_has/Falset5_2qmd0FalseFalset3_eaxhqhttp://esec-lab.sogeti.com/dotclear/index.php?post/2010/11/21/Presentation-at-Hack.lu-:-Reversing-the-Broacom-NetExtreme-s-firmware
1290276162.025blogs.sans.orge9681How to Get Started With Malware Analysisjaymill2721http://www.reddit.com/r/ReverseEngineering/comments/e9681/how_to_get_started_with_malware_analysis/Falset5_2qmd0FalseFalset3_e9681http://blogs.sans.org/computer-forensics/2010/11/12/get-started-with-malware-analysis/
1289498261.025jacquelin.potier.free.fre4otwWinAPIOverride32 : Free Advanced API Monitor, spy or override API or exe internal functions2503http://www.reddit.com/r/ReverseEngineering/comments/e4otw/winapioverride32_free_advanced_api_monitor_spy_or/Falset5_2qmd0FalseFalset3_e4otwhttp://jacquelin.potier.free.fr/winapioverride32/
1279569934.025code.google.comcrc8upescrambler - open sourced - Google Code2614http://www.reddit.com/r/ReverseEngineering/comments/crc8u/pescrambler_open_sourced_google_code/Falset5_2qmd0FalseFalset3_crc8uhttp://code.google.com/p/pescrambler/
1276077388.024symantec.comcd2o7Analysis of a Zero-day Exploit for Adobe Flash and Readercli3nt2622http://www.reddit.com/r/ReverseEngineering/comments/cd2o7/analysis_of_a_zeroday_exploit_for_adobe_flash_and/Falset5_2qmd0FalseFalset3_cd2o7http://www.symantec.com/connect/blogs/analysis-zero-day-exploit-adobe-flash-and-reader
1274167380.026blog.zynamics.comc5gh0Ten years of innovation in reverse engineeringpengor3371http://www.reddit.com/r/ReverseEngineering/comments/c5gh0/ten_years_of_innovation_in_reverse_engineering/Falset5_2qmd0FalseFalset3_c5gh0http://blog.zynamics.com/2010/05/17/ten-years-of-innovation-in-reverse-engineering-2/
1270740867.025blog.metasploit.combo79rPenetration Testing: Learn Assembly? [metasploit]2610http://www.reddit.com/r/ReverseEngineering/comments/bo79r/penetration_testing_learn_assembly_metasploit/Falset5_2qmd0FalseFalset3_bo79rhttp://blog.metasploit.com/2010/04/penetration-testing-learn-assembly.html
1266319721.026rdist.root.orgb2nboReverse Engineering a Smart Meterwtbw2820http://www.reddit.com/r/ReverseEngineering/comments/b2nbo/reverse_engineering_a_smart_meter/Falset5_2qmd0FalseFalset3_b2nbohttp://rdist.root.org/2010/02/15/reverse-engineering-a-smart-meter/
1260895061.025jegerlehner.comaeygwIntel Assembler Code Table - [PDF]28314http://www.reddit.com/r/ReverseEngineering/comments/aeygw/intel_assembler_code_table_pdf/Falset5_2qmd0FalseFalset3_aeygwhttp://www.jegerlehner.com/intel/IntelCodeTable.pdf
1257297855.025malwarebytes.besttechie.neta0ow4Chinese AV vendor caught with their pants down, warezing the signature databases of other vendorsrolfr2613http://www.reddit.com/r/ReverseEngineering/comments/a0ow4/chinese_av_vendor_caught_with_their_pants_down/Falset5_2qmd0FalseFalset3_a0ow4http://malwarebytes.besttechie.net/2009/11/02/iobit-steals-malwarebytes-intellectual-property/
1238906186.025fravia.com8a2qfFravia's still alive; nice picture of him with Richard Stallmanrolfr2610http://www.reddit.com/r/ReverseEngineering/comments/8a2qf/fravias_still_alive_nice_picture_of_him_with/Falset5_2qmd0FalseFalset3_8a2qfhttp://www.fravia.com/spring2009.htm
1374780837.024blog.malwarebytes.org1j1q6gZeroAccess Anti-Debug Uses DebuggerCecileMBAM3393http://www.reddit.com/r/ReverseEngineering/comments/1j1q6g/zeroaccess_antidebug_uses_debugger/Falset5_2qmd0FalseFalset3_1j1q6ghttp://blog.malwarebytes.org/intelligence/2013/07/zeroaccess-anti-debug-uses-debugger/
1371957622.024exploit-monday.com1gw2rnExploit Monday: Undocumented NtQuerySystemInformation Structures (Updated for Windows 8)niko-r36120http://www.reddit.com/r/ReverseEngineering/comments/1gw2rn/exploit_monday_undocumented/Falset5_2qmd0FalseFalset3_1gw2rnhttp://www.exploit-monday.com/2013/06/undocumented-ntquerysysteminformation.html
1368431173.023self.ReverseEngineering1e8f73x86(_64) disassembler in Lua - udis86 bindingswillsteel2961http://www.reddit.com/r/ReverseEngineering/comments/1e8f73/x86_64_disassembler_in_lua_udis86_bindings/[http://ludis86.schmoock.net/index.html](http://ludis86.schmoock.net/index.html)Simple Usage: local ludis86 = require('ludis86') local ud = ludis86.init_file_intel64('YOUR.EXE', 0x1000) while ud:dis() > 0 do print(string.format('+%04X %016s %016s', ud:off(), ud:hex(), ud:asm())) endFalset5_2qmd01368467171.0Truet3_1e8f73http://www.reddit.com/r/ReverseEngineering/comments/1e8f73/x86_64_disassembler_in_lua_udis86_bindings/
1368136000.025qmro.qmul.ac.uk1e119fThe Legal Regulation of Decompilation of Computer Programs: Excessive, Unjustified and in Need of Reform - Noam Shemtov [Thesis, PDF]igor_sk2831http://www.reddit.com/r/ReverseEngineering/comments/1e119f/the_legal_regulation_of_decompilation_of_computer/Falset5_2qmd0FalseFalset3_1e119fhttps://qmro.qmul.ac.uk/jspui/bitstream/123456789/3132/1/SHEMTOVTheLegal2012.pdf
1363380797.024volatility.googlecode.com1adejwVolatility Plugins Cheatsheet put together by Volatility devs [PDF]transt2954http://www.reddit.com/r/ReverseEngineering/comments/1adejw/volatility_plugins_cheatsheet_put_together_by/Falset5_2qmd0FalseFalset3_1adejwhttps://volatility.googlecode.com/files/CheatSheet_v2.3.pdf
1362742898.023self.ReverseEngineering19wo4zExploitation on the OSX platformblahfish26313http://www.reddit.com/r/ReverseEngineering/comments/19wo4z/exploitation_on_the_osx_platform/As a hobby I've been reading OSX exploits. So far the contents I have browsed through(and am browsing through currently) include the following :-- Very old exploits at exploit-db.com- Few metasploit modules which seem to be present(the free version of msf, not the paid one)- Reverse engineering notes at reverse.put.asAre there any malware samples I should be checking out? Any suggestions on where I could proceed from here? thanks.Falset5_2qmd0FalseTruet3_19wo4zhttp://www.reddit.com/r/ReverseEngineering/comments/19wo4z/exploitation_on_the_osx_platform/
1361302555.025scribd.com18u2oqAnalysis of 'Super Password 1.0'. (Remarks welcome..)bmantra371234http://www.reddit.com/r/ReverseEngineering/comments/18u2oq/analysis_of_super_password_10_remarks_welcome/Falset5_2qmd0FalseFalset3_18u2oqhttp://www.scribd.com/doc/125680875/Analysis-of-Super-Password-1-0
1359491735.022self.ReverseEngineering17ikwtThe next step to bug hunting?00Blitz28612http://www.reddit.com/r/ReverseEngineering/comments/17ikwt/the_next_step_to_bug_hunting/I believe the odds of some bug hunters reading this reddit are quite high. I would greatly appreciate if I (and all others) may query your experiences about this topic. Even a single query is appreciated!After one has obtained the basics in x86 ASM, familiarity with tools such as [ImmDBG](https://www.immunityinc.com/products-immdbg.shtml)/[WinDBG](http://msdn.microsoft.com/en-us/windows/hardware/gg463009.aspx) and some knowledge on types of vulnerabilities,* *how do you pick your target?*Reward programs such as [ZDI](http://www.zerodayinitiative.com/advisories/upcoming/) and [EIP](https://www.exodusintel.com/eip/) are not clearly stating as to what products to aim for. Surely we can deduce a bit from the published advisories, but only very high level.I see two flavours of targets:* Browsers and their addons/extensions (such as Flash/Shockwave)* OthersEspecially the latter category is huge. Without any evidence and just based on gut feeling I feel that programs such as MS Word/Excel/PDF readers are targeted by allot of researchers. I'd rather go for some less known products, but * *which ones?** *Am I seeing monsters under the bed by thinking the odds of submitting a duplicate bug in those big programs is high?** *How often did you experience this?* **Slightly unrelated to the original question**Anyone followed one of these courses/workshops and willing to share their experience? What was your entry level knowledge wise? What did you learn/gain most from it?* [Exodus Intel - Breaking Binary Applications](http://blog.exodusintel.com/2012/12/17/exodus-intelligence-2013-training-courses/)* [Attack Secure - Ninja Skills](http://attack-secure.com/index.php/ninja-skills/)* Others?Falset5_2qmd0FalseTruet3_17ikwthttp://www.reddit.com/r/ReverseEngineering/comments/17ikwt/the_next_step_to_bug_hunting/
1358865684.026eprint.iacr.org1720xoCan a Program Reverse-Engineer Itself? by Antoine Amarilli, David Naccache, Pablo Rauzy, and Emil Simion [PDF] turnersr3378http://www.reddit.com/r/ReverseEngineering/comments/1720xo/can_a_program_reverseengineer_itself_by_antoine/Falset5_2qmd0FalseFalset3_1720xohttp://eprint.iacr.org/2011/497.pdf
1355381509.024webcache.googleusercontent.com14rvq1Hacking Windows 8 Gamesnick_name2732http://www.reddit.com/r/ReverseEngineering/comments/14rvq1/hacking_windows_8_games/Falset5_2qmd0FalseFalset3_14rvq1http://webcache.googleusercontent.com/search?q=cache:justinangel.net/HackingWindows8Games
1353003679.024docs.google.com1391wtBuffer overflow and shellcoding tutorials 1 and 2goonmaster3175http://www.reddit.com/r/ReverseEngineering/comments/1391wt/buffer_overflow_and_shellcoding_tutorials_1_and_2/Falset5_2qmd0FalseFalset3_1391wthttps://docs.google.com/folder/d/0B_MdjdiK7-hxeUdCa1JmMGROQkE/edit
1351945772.025media.blackhat.com12k8gyHDMI – Hacking Displays Made Interesting [PDF]igor_sk31610http://www.reddit.com/r/ReverseEngineering/comments/12k8gy/hdmi_hacking_displays_made_interesting_pdf/Falset5_2qmd0FalseFalset3_12k8gyhttp://media.blackhat.com/bh-eu-12/Davis/bh-eu-12-Davis-HDMI-WP.pdf
1351639958.024blog.hugogascon.com12d8wnReversing malware protocols with machine learningrolfr2951http://www.reddit.com/r/ReverseEngineering/comments/12d8wn/reversing_malware_protocols_with_machine_learning/Falset5_2qmd0FalseFalset3_12d8wnhttp://blog.hugogascon.com/2012/10/reversing-malware-protocols-with_28.html
1351243306.024facultyresourcecenter.com124713Windows Operating System Internals Curriculum Resource Kitffffdddddssss2953http://www.reddit.com/r/ReverseEngineering/comments/124713/windows_operating_system_internals_curriculum/Falset5_2qmd0FalseFalset3_124713https://www.facultyresourcecenter.com/curriculum/pfv.aspx?ID=6191&c1=en-us&c2=0
1340611972.026keeper.lubie.orgvkay2Tutorial: Convert PE EXE to DLLAggrajag2715http://www.reddit.com/r/ReverseEngineering/comments/vkay2/tutorial_convert_pe_exe_to_dll/Falset5_2qmd0FalseFalset3_vkay2http://keeper.lubie.org/other_docs/change_exe_to_dll.htm
1339359541.026ieee-security.orguv0itUnleashing Mayhem on Binary Code [PDF]rolfr2715http://www.reddit.com/r/ReverseEngineering/comments/uv0it/unleashing_mayhem_on_binary_code_pdf/Falset5_2qmd0FalseFalset3_uv0ithttp://www.ieee-security.org/TC/SP2012/papers/4681a380.pdf
1337872046.023conference.hitb.orgu2u2zHack In The Box 2012 Amsterdam Slides (still being updated!)fsdfsdfsdfsdfsdfsdpf2741http://www.reddit.com/r/ReverseEngineering/comments/u2u2z/hack_in_the_box_2012_amsterdam_slides_still_being/Falset5_2qmd0FalseFalset3_u2u2zhttp://conference.hitb.org/hitbsecconf2012ams/materials/
1337290266.026blog.ikotler.orgts9xgCan /usr/bin/python replace /bin/sh as all-time favorite execve() shellcode?ikotler3373http://www.reddit.com/r/ReverseEngineering/comments/ts9xg/can_usrbinpython_replace_binsh_as_alltime/Falset5_2qmd0FalseFalset3_ts9xghttp://blog.ikotler.org/2012/05/linuxx86-execve-python-interpreter-with.html
1327242023.024openrce.orgorgcuFinding Bugs in VMs with a Theorem Prover, Round 1 -- by merolfr3064http://www.reddit.com/r/ReverseEngineering/comments/orgcu/finding_bugs_in_vms_with_a_theorem_prover_round_1/Falset5_2qmd0FalseFalset3_orgcuhttp://www.openrce.org/blog/view/1963/Finding_Bugs_in_VMs_with_a_Theorem_Prover,_Round_1
1326272404.024self.ReverseEngineeringoc5j5x86 Assembly and reverse engineering for beginners?ehudt371312http://www.reddit.com/r/ReverseEngineering/comments/oc5j5/x86_assembly_and_reverse_engineering_for_beginners/Do you know any good resources for learning?I have knowledge of assembly (MIPS), and want to make it more pratical.Falset5_2qmd0FalseTruet3_oc5j5http://www.reddit.com/r/ReverseEngineering/comments/oc5j5/x86_assembly_and_reverse_engineering_for_beginners/
1322906707.024picturoku.blogspot.commym2eA bit away from kernel executionar1vr2510http://www.reddit.com/r/ReverseEngineering/comments/mym2e/a_bit_away_from_kernel_execution/Falset5_2qmd0FalseFalset3_mym2ehttp://picturoku.blogspot.com/2011/12/bit-away-from-kernel-execution.html
1318063374.026blog.9bplus.coml4zgoMalicious PDFs with LaTeXwishi2820http://www.reddit.com/r/ReverseEngineering/comments/l4zgo/malicious_pdfs_with_latex/Falset5_2qmd0FalseFalset3_l4zgohttp://blog.9bplus.com/latex-malicious-pdf-generation
1317070503.023mista.nuks6xmKernel Attacks through User-Mode Callbacks in win32kyuhong2630http://www.reddit.com/r/ReverseEngineering/comments/ks6xm/kernel_attacks_through_usermode_callbacks_in/Falset5_2qmd0FalseFalset3_ks6xmhttp://www.mista.nu/research/mandt-win32k-paper.pdf
1312749895.024matasano.comjbrzpAttacking Clientside JIT Compilersrolfr2620http://www.reddit.com/r/ReverseEngineering/comments/jbrzp/attacking_clientside_jit_compilers/Falset5_2qmd0FalseFalset3_jbrzphttp://www.matasano.com/research/jit/
1311944200.024hexblog.comj361jIDA Pro 6.2 with database snapshots support0xeb30615http://www.reddit.com/r/ReverseEngineering/comments/j361j/ida_pro_62_with_database_snapshots_support/Falset5_2qmd0FalseFalset3_j361jhttp://www.hexblog.com/?p=415
1311111814.021utdallas.eduiu7puDifferentiating Code from Data in x86 Binaries [PDF]rolfr2766http://www.reddit.com/r/ReverseEngineering/comments/iu7pu/differentiating_code_from_data_in_x86_binaries_pdf/Falset5_2qmd0FalseFalset3_iu7puhttp://www.utdallas.edu/~hamlen/wartell-pkdd11.pdf
1310925558.024canthack.orgis4e5Adventures with Radare2 #1: A Simple Shellcode Analysisvext012845http://www.reddit.com/r/ReverseEngineering/comments/is4e5/adventures_with_radare2_1_a_simple_shellcode/Falset5_2qmd0FalseFalset3_is4e5http://canthack.org/2011/07/adventures-with-radare-1-a-simple-shellcode-analysis/
1310267286.022devttys0.comilcc7Reverse Engineering VxWorks Firmwareigor_sk3082http://www.reddit.com/r/ReverseEngineering/comments/ilcc7/reverse_engineering_vxworks_firmware/Falset5_2qmd0FalseFalset3_ilcc7http://www.devttys0.com/2011/07/reverse-engineering-vxworks-firmware-wrt54gv8/
1309942103.025sites.google.comihyruFacebook Forensics Paper Published_pusher_2944http://www.reddit.com/r/ReverseEngineering/comments/ihyru/facebook_forensics_paper_published/Falset5_2qmd0FalseFalset3_ihyruhttps://sites.google.com/site/valkyriexsecurityresearch/announcements/facebookforensicspaperpublished
1309773361.025blog.rewolf.pligak8 Mixing x86 with x64 code_pusher_3050http://www.reddit.com/r/ReverseEngineering/comments/igak8/mixing_x86_with_x64_code/Falset5_2qmd0FalseFalset3_igak8http://blog.rewolf.pl/blog/?p=102
1308886030.025sites.google.comi7s7rPinczakko's Guide to Award BIOS Reverse Engineeringdwdwdw22836http://www.reddit.com/r/ReverseEngineering/comments/i7s7r/pinczakkos_guide_to_award_bios_reverse_engineering/Falset5_2qmd0FalseFalset3_i7s7rhttps://sites.google.com/site/pinczakko/pinczakko-s-guide-to-award-bios-reverse-engineering
1306426106.024trailofbits.files.wordpress.comhkqq1HACKING AT MACH 2! [PDF]2951http://www.reddit.com/r/ReverseEngineering/comments/hkqq1/hacking_at_mach_2_pdf/Falset5_2qmd0FalseFalset3_hkqq1http://trailofbits.files.wordpress.com/2011/01/hackingatmach2.pdf
1302629029.024pxnow.prevx.comgocr0Analysis of ZeroAccess Rootkit - Prevx [PDF]gnewman2733http://www.reddit.com/r/ReverseEngineering/comments/gocr0/analysis_of_zeroaccess_rootkit_prevx_pdf/Falset5_2qmd0FalseFalset3_gocr0http://pxnow.prevx.com/content/blog/zeroaccess_analysis.pdf
1301613288.025backerstreet.comgfwk7REC decompiler is alive! (4.0 beta is out)igor_sk2616http://www.reddit.com/r/ReverseEngineering/comments/gfwk7/rec_decompiler_is_alive_40_beta_is_out/Falset5_2qmd0FalseFalset3_gfwk7http://www.backerstreet.com/rec/rec.htm
1299874965.023securityevaluators.comg25wdMac OS X Hacking - Snow Leopard Edition [PDF]2743http://www.reddit.com/r/ReverseEngineering/comments/g25wd/mac_os_x_hacking_snow_leopard_edition_pdf/Falset5_2qmd0FalseFalset3_g25wdhttp://securityevaluators.com/files/papers/SnowLeopard.pdf
1298204127.023self.ReverseEngineeringfoyg5Fixing a bug in a game without having the source code, possible?Denvildaste331027http://www.reddit.com/r/ReverseEngineering/comments/foyg5/fixing_a_bug_in_a_game_without_having_the_source/One of my favorite games to play on LAN with friends is Command & Conquer Generals: Zero hour, the game has a bug where the game mismatches and everyone gets disconnected, unfortunately the game is old and no longer supported by EA so there will be no patch to fix it.Is it possible for me to fix this bug myself? what I had in mind is a modified executable that detects when a mismatch occurs, pauses the game copies the game state from the host to all the connected clients and resumes the game, or maybe add the ability to save/load multiplayer games, the question is, is it possible to do such things? and if so how hard is it? where do you recommend I start if I don't have much experience in this field?Falset5_2qmd0FalseTruet3_foyg5http://www.reddit.com/r/ReverseEngineering/comments/foyg5/fixing_a_bug_in_a_game_without_having_the_source/
1296086934.024self.ReverseEngineeringf9ojcGood Windows Hex Editor?emrikol31730http://www.reddit.com/r/ReverseEngineering/comments/f9ojc/good_windows_hex_editor/Can anyone recommend me a good text editor for Windows? Preferably one that may use some of the features of Windows 7 to speed up my workflow? I've been using my old copy of WinHex for what feels like ten years now and I think it may be time to upgrade. I tried a newer version of WinHex a few months ago and there seems to be little changed in the way of UI.Falset5_2qmd0FalseTruet3_f9ojchttp://www.reddit.com/r/ReverseEngineering/comments/f9ojc/good_windows_hex_editor/
1295325708.023hooked-on-mnemonics.blogspot.comf48gnAn Intro to Creating Anti-Virus Signatures2521http://www.reddit.com/r/ReverseEngineering/comments/f48gn/an_intro_to_creating_antivirus_signatures/Falset5_2qmd0FalseFalset3_f48gnhttp://hooked-on-mnemonics.blogspot.com/2011/01/intro-to-creating-anti-virus-signatures.html
1295092422.024ibm.comf2rumGreat moments in microprocessor historyrolfr3061http://www.reddit.com/r/ReverseEngineering/comments/f2rum/great_moments_in_microprocessor_history/Falset5_2qmd0FalseFalset3_f2rumhttp://www.ibm.com/developerworks/library/pa-microhist.html
1294439113.024ghostintheshellcode.comey5naReminder: Ghost in the Shellcode contest started 25 minutes agorolfr2738http://www.reddit.com/r/ReverseEngineering/comments/ey5na/reminder_ghost_in_the_shellcode_contest_started/Falset5_2qmd0FalseFalset3_ey5nahttp://ghostintheshellcode.com/2011/?lol=wut
1294319091.024binary-auditing.comex7vnBeginners Guide The Binary Auditor™2957http://www.reddit.com/r/ReverseEngineering/comments/ex7vn/beginners_guide_the_binary_auditor/Falset5_2qmd0FalseFalset3_ex7vnhttp://www.binary-auditing.com/beginners-guide/
1293596012.025vodpod.comeswh5Adventures in analyzing Stuxnet (Bruce Dang from Microsoft) [VIDEO]rolfr2728http://www.reddit.com/r/ReverseEngineering/comments/eswh5/adventures_in_analyzing_stuxnet_bruce_dang_from/Falset5_2qmd0FalseFalset3_eswh5http://vodpod.com/watch/5212932-27c3-adventures-in-analyzing-stuxnet-bruce-dang-from-microsoft
1292598935.026siliconpr0n.wikispaces.comenfktSilicon pr0n: hardware reverse engineering wikinmesisgeek3267http://www.reddit.com/r/ReverseEngineering/comments/enfkt/silicon_pr0n_hardware_reverse_engineering_wiki/Falset5_2qmd0FalseFalset3_enfkthttp://siliconpr0n.wikispaces.com/
1290810988.025kickstarter.comec8geThe OpenVizsla USB protocol analyzer is fully funded! That was quick. But the project leaders could still use additional supportrolfr2720http://www.reddit.com/r/ReverseEngineering/comments/ec8ge/the_openvizsla_usb_protocol_analyzer_is_fully/Falset5_2qmd0FalseFalset3_ec8gehttp://www.kickstarter.com/projects/bushing/openvizsla-open-source-usb-protocol-analyzer?blah=foo
1286048468.023self.ReverseEngineeringdlzh0I believe I've found the JTAGs for AT&T 3G MicroCell/Cisco FemtocellGodRa2967http://www.reddit.com/r/ReverseEngineering/comments/dlzh0/i_believe_ive_found_the_jtags_for_att_3g/Just following up on my [old post](http://www.reddit.com/r/netsec/comments/d7450/i_just_recently_got_my_hands_on_a_attcisco_3g/) in hopes of sparking some interest in hardware hacking. Just got around to looking at the docs again and it looks like the picoChip baseband processor is based on the ARM 926EJ-S processor, so that has a JTAG.I've tested the resistance from Vss to various JTAG I/Os and this [photo](http://i.imgur.com/fljbN.jpg) is my guess of the JTAG pins. The resistance information was based on the presentation by Gerrit van der Bij,'[The Embedded JTAG interface HOWTO](https://har2009.org/program/attachments/127_JTAG-v2.0.pdf)' :> •JTAG only has one output pin.> > –The TDO pin: when JTAG is inactive, the TDO pin should NOT be driven.> > –The resistance of the driver transistors when they are NOT driven is very large (>10MΩ) to both power supply and ground.> > •JTAG has 3 'interesting' input pins.> > –To prevent drifting voltages on these pins, they are terminated via a resistor to either ground or the supply voltage. It is a very low resistance compared to that of the output (<10KΩ)It looks like a PCB pads for a regular 14-pin header socket found on some ARM-based boards.Gonna get some newer USB JTAG connector to see if this is correct. The [Segger J-Link EDU](http://www.segger.com/cms/j-link-edu.html) seems cool and is [pretty cheap](http://www.segger-us.com/jlinkjtagemulator.htm), $60.Will also order a couple [four-wall headers](http://search.digikey.com/scripts/DkSearch/dksus.dll?Detail&name=S9186-ND) to solder on the two 14-pin pads.Falset5_2qmd0FalseTruet3_dlzh0http://www.reddit.com/r/ReverseEngineering/comments/dlzh0/i_believe_ive_found_the_jtags_for_att_3g/
1263740416.025ompf.orgaqnu2[fun!] metatrace, a C++ compile time ray tracerwishi2833http://www.reddit.com/r/ReverseEngineering/comments/aqnu2/fun_metatrace_a_c_compile_time_ray_tracer/Falset5_2qmd0FalseFalset3_aqnu2http://ompf.org/forum/viewtopic.php?f=8&t=1556
1248419879.025self.ReverseEngineering943xfself post: administriviarolfr2839http://www.reddit.com/r/ReverseEngineering/comments/943xf/self_post_administrivia/Some thoughts: This subreddit needs more contributions. I'm thankful for everyone who does contribute, but as it stands I submit the vast majority of the entries. We'd all benefit from multiple perspectives on reverse engineering, not just my crusty cracking/academic one. There are 2220 subscribers to this subreddit at this moment, so I refuse to believe that none of you out there have a useful link to submit.Remember to up-vote if you like a submission: this subreddit is small enough that a single down-vote can doom a submission. Much of the stuff I submit gets 1-3 upvotes and 1-2 downvotes.As suggested by sanitybit below, we would have more of a community if people commented more on things. I'm thinking also about an IRC channel? Anyone interested? Let's say EFNet #rereddit?Amber, if you still read this reddit, contact me somehow. I've fallen out of touch with you this year and I want to talk to you.Falset5_2qmd0TrueTruet3_943xfhttp://www.reddit.com/r/ReverseEngineering/comments/943xf/self_post_administrivia/
1238569113.024gamedevelopment.com893mlKeeping the Pirates at Bay: Implementing Crack Protection for Spyro: Year of the Dragonrolfr2843http://www.reddit.com/r/ReverseEngineering/comments/893ml/keeping_the_pirates_at_bay_implementing_crack/Falset5_2qmd0FalseFalset3_893mlhttp://www.gamedevelopment.com/features/20011017/dodd_01.htm
1375742807.021c7zero.info1jrsxpA Tale of One Software Bypass of Windows 8 Secure Boot - BH2013 slides [PDF]igor_sk2652http://www.reddit.com/r/ReverseEngineering/comments/1jrsxp/a_tale_of_one_software_bypass_of_windows_8_secure/Falset5_2qmd0FalseFalset3_1jrsxphttp://www.c7zero.info/stuff/Windows8SecureBoot_Bulygin-Furtak-Bazhniuk_BHUSA2013.pdf
1373756804.022github.com1i8s19A symbolic execution engine for Pythonturnersr27514http://www.reddit.com/r/ReverseEngineering/comments/1i8s19/a_symbolic_execution_engine_for_python/Falset5_2qmd0FalseFalset3_1i8s19https://github.com/diffoperator/Sypy
1366089216.023utdallas.edu1cg0c1The world's first compiler agnostic binary rewriterAdamMiller3187http://www.reddit.com/r/ReverseEngineering/comments/1cg0c1/the_worlds_first_compiler_agnostic_binary_rewriter/Falset5_2qmd0FalseFalset3_1cg0c1http://www.utdallas.edu/~hamlen/wartell12acsac.pdf
1364571927.023self.ReverseEngineering1b8w3xSetting up a public malware sample exchange itsnotapt341125http://www.reddit.com/r/ReverseEngineering/comments/1b8w3x/setting_up_a_public_malware_sample_exchange/So, I'm going to start this off by saying, I dont' know how this is going to work, but I'm hopping as a community, we can put something cool together.I'm currently scraping about 500Mb worth of samples a day on my own, outside of work, because of that, I'd like to find a way to share these with others. On one hand, I could send them all to Virus Total and move on with my life. However, there are a lot of folks, who are simply trying to get their hands on samples and I would like to help get my data into their hands. My current idea, is to setup an EC2 instance that is simply a drop point where I'll have the past week's worth of samples in archives. If anyone has any suggestions or ideas, I'd love to hear them.Falset5_2qmd0FalseTruet3_1b8w3xhttp://www.reddit.com/r/ReverseEngineering/comments/1b8w3x/setting_up_a_public_malware_sample_exchange/
1363710135.024cs.lmu.edu1allqdLinux System Callsigor_sk2847http://www.reddit.com/r/ReverseEngineering/comments/1allqd/linux_system_calls/Falset5_2qmd0FalseFalset3_1allqdhttp://cs.lmu.edu/~ray/notes/linuxsyscalls/
1362237025.023gironsec.com19ivfa.net reversing and IL modification. Good read :)Av3ragej0e3299http://www.reddit.com/r/ReverseEngineering/comments/19ivfa/net_reversing_and_il_modification_good_read/Falset5_2qmd0FalseFalset3_19ivfahttp://www.gironsec.com/blog/2013/02/net-reversing-and-msil-modification/
1356352884.024quequero.org15dekuUIC R.E. Academyffffdddddssss2510http://www.reddit.com/r/ReverseEngineering/comments/15deku/uic_re_academy/Falset5_2qmd0FalseFalset3_15dekuhttp://quequero.org/
1354185991.023self.ReverseEngineering13zl5fReupload video Using IDA Pro removed from Youtubebolzano_19892850http://www.reddit.com/r/ReverseEngineering/comments/13zl5f/reupload_video_using_ida_pro_removed_from_youtube/Could anybody reupload the video 'Using IDA Pro' removed from Youtube?http://www.youtube.com/watch?v=K08Zw_l4xSwI see this link in the beginner reddit thread.Falset5_2qmd0FalseTruet3_13zl5fhttp://www.reddit.com/r/ReverseEngineering/comments/13zl5f/reupload_video_using_ida_pro_removed_from_youtube/
1351187175.023codeproject.com122r0xX86/ARM Emulator - CodeProjectnullandnull2850http://www.reddit.com/r/ReverseEngineering/comments/122r0x/x86arm_emulator_codeproject/Falset5_2qmd0FalseFalset3_122r0xhttp://www.codeproject.com/Articles/478527/X86-ARM-Emulator
1351158414.023code.google.com12247tMalwasm - Offline debugger for malware's reverse engineeringN3mes1s2853http://www.reddit.com/r/ReverseEngineering/comments/12247t/malwasm_offline_debugger_for_malwares_reverse/Falset5_2qmd0FalseFalset3_12247thttp://code.google.com/p/malwasm/
1350402492.025wiki.mozilla.org11koyvAbstract Interpretation - MozillaWikiturnersr2724http://www.reddit.com/r/ReverseEngineering/comments/11koyv/abstract_interpretation_mozillawiki/Falset5_2qmd0FalseFalset3_11koyvhttps://wiki.mozilla.org/Abstract_Interpretation
1349823682.021davtbaum.com117xenReverse Engineering Android: Disassembling Hello Worlddavtbaum31102http://www.reddit.com/r/ReverseEngineering/comments/117xen/reverse_engineering_android_disassembling_hello/Falset5_2qmd0FalseFalset3_117xenhttp://www.davtbaum.com/?p=93
1349317555.024self.ReverseEngineering10wvxoFree Lancing REredteamer2954http://www.reddit.com/r/ReverseEngineering/comments/10wvxo/free_lancing_re/I see that we have the quarterly hiring thread for companies to post about full-time jobs. Would it be possible to have a similar thread to go to look for freelance and/or remote work? I apologize in advance if this is not the correct place to put this.Falset5_2qmd0FalseTruet3_10wvxohttp://www.reddit.com/r/ReverseEngineering/comments/10wvxo/free_lancing_re/
1348505097.022volatility-labs.blogspot.com10edrpDetecting Malware Hooks in the Windows GUI Subsystemtranst36140http://www.reddit.com/r/ReverseEngineering/comments/10edrp/detecting_malware_hooks_in_the_windows_gui/Falset5_2qmd0FalseFalset3_10edrphttp://volatility-labs.blogspot.com/2012/09/movp-31-detecting-malware-hooks-in.html
1346732336.023enegue.comzbiq1Consonance, an IDA Color Schemesanitybit2854http://www.reddit.com/r/ReverseEngineering/comments/zbiq1/consonance_an_ida_color_scheme/Falset5_2qmd0FalseFalset3_zbiq1http://enegue.com/consonance-an-ida-color-scheme/
1344274869.025blog-oppida.blogspot.frxrx87Solution for the ESET BlackHat US Challenge 2012rolfr2831http://www.reddit.com/r/ReverseEngineering/comments/xrx87/solution_for_the_eset_blackhat_us_challenge_2012/Falset5_2qmd0FalseFalset3_xrx87http://blog-oppida.blogspot.fr/2012/08/solution-for-eset-blackhat-us-challenge.html
1340990271.024blog.cryptographyengineering.comvsx6yFlaws in PKCS#1v1.5 padding: SecurId token key extracted in 13 minutesigor_sk3390http://www.reddit.com/r/ReverseEngineering/comments/vsx6y/flaws_in_pkcs1v15_padding_securid_token_key/Falset5_2qmd0FalseFalset3_vsx6yhttp://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.html
1340663478.024vupen.comvlhhlAdvanced Exploitation of Mozilla Firefox Use-after-free Vulnerabilities (MFSA 2012-22 / CVE-2012-0469)bugslap2953http://www.reddit.com/r/ReverseEngineering/comments/vlhhl/advanced_exploitation_of_mozilla_firefox/Falset5_2qmd0FalseFalset3_vlhhlhttp://www.vupen.com/blog/20120625.Advanced_Exploitation_of_Mozilla_Firefox_UaF_CVE-2012-0469.php
1338560332.021youtube.comufmo8DEFCON 17: Reverse Engineering By Crayon: Hypervisor Based Malware Analysis and Visualization (Has some pointers for de-obfuscation)GeminiVI2762http://www.reddit.com/r/ReverseEngineering/comments/ufmo8/defcon_17_reverse_engineering_by_crayon/Falset5_2qmd0FalseFalset3_ufmo8http://www.youtube.com/watch?v=i3I8wtrjYY4
1337856597.022malware.luu2krsMalware.lu - Repository of malware and technical analysisrolfr2972http://www.reddit.com/r/ReverseEngineering/comments/u2krs/malwarelu_repository_of_malware_and_technical/Falset5_2qmd0FalseFalset3_u2krshttp://www.malware.lu/article.php
1337397299.024waleedassar.blogspot.comtu94fPE Explorer Heap Overflow Vulnerabilitywaliedassar2732http://www.reddit.com/r/ReverseEngineering/comments/tu94f/pe_explorer_heap_overflow_vulnerability/Falset5_2qmd0FalseFalset3_tu94fhttp://waleedassar.blogspot.com/2012/05/pe-explorer-heap-overflow-vulnerability.html
1319107183.023fluxius.handgrep.selikndThe Art Of ELF: Analysises and Exploitationswishi2740http://www.reddit.com/r/ReverseEngineering/comments/liknd/the_art_of_elf_analysises_and_exploitations/Falset5_2qmd0FalseFalset3_likndhttp://fluxius.handgrep.se/2011/10/20/the-art-of-elf-analysises-and-exploitations/
1314895781.022code.google.comk1gl5Android 'rip-off indicator' of applicationsadesnos2750http://www.reddit.com/r/ReverseEngineering/comments/k1gl5/android_ripoff_indicator_of_applications/Falset5_2qmd0FalseFalset3_k1gl5http://code.google.com/p/androguard/wiki/Similarity#Androcsign/Androsign
1308665268.023whitephosphorus.orgi59bwWhite Phosphorus Exploit Pack Sayonara ASLR DEP Bypass Techniquepolsab2745http://www.reddit.com/r/ReverseEngineering/comments/i59bw/white_phosphorus_exploit_pack_sayonara_aslr_dep/Falset5_2qmd0FalseFalset3_i59bwhttp://www.whitephosphorus.org/sayonara.txt
1308602544.027us.blizzard.comi4n03Job: Blizzard Entertainment: Anti-Cheat Engineerdiff-t39126http://www.reddit.com/r/ReverseEngineering/comments/i4n03/job_blizzard_entertainment_anticheat_engineer/Falset5_2qmd0FalseFalset3_i4n03http://us.blizzard.com/en-us/company/careers/posting.html?id=110005K
1307643246.021blog.delroth.nethvparReverse engineering a Wii game script interpreter, part 1nepcoder2650http://www.reddit.com/r/ReverseEngineering/comments/hvpar/reverse_engineering_a_wii_game_script_interpreter/Falset5_2qmd0FalseFalset3_hvparhttp://blog.delroth.net/2011/06/reverse-engineering-a-wii-game-script-interpreter-part-1/
1305665197.024documents.epfl.chhdnnbThe Factorization of RSA768bulibuta2622http://www.reddit.com/r/ReverseEngineering/comments/hdnnb/the_factorization_of_rsa768/Falset5_2qmd0FalseFalset3_hdnnbhttps://documents.epfl.ch/users/l/le/lenstra/public/papers/rsa768.txt
1303175238.023raptorfactor.comgt7goCompile-time String Encryption with C++0xrolfr2749http://www.reddit.com/r/ReverseEngineering/comments/gt7go/compiletime_string_encryption_with_c0x/Falset5_2qmd0FalseFalset3_gt7gohttp://www.raptorfactor.com/compile-time-string-encryption-with-c0x/
1299009406.021blog.zynamics.comfv9cdZynamics has been acquired by Google!dguido28713http://www.reddit.com/r/ReverseEngineering/comments/fv9cd/zynamics_has_been_acquired_by_google/Falset5_2qmd0FalseFalset3_fv9cdhttp://blog.zynamics.com/2011/03/01/zynamics-acquired-by-google/
1298881184.024binary-auditing.comfu6rxReturn of Binary-Auditing!imabrokendownload3061http://www.reddit.com/r/ReverseEngineering/comments/fu6rx/return_of_binaryauditing/Falset5_2qmd0FalseFalset3_fu6rxhttp://www.binary-auditing.com
1297930597.024f-secure.comfn2svAnalysis of an MBR file system infectorSiberianJay2620http://www.reddit.com/r/ReverseEngineering/comments/fn2sv/analysis_of_an_mbr_file_system_infector/Falset5_2qmd0FalseFalset3_fn2svhttp://www.f-secure.com/weblog/archives/00002101.html
1293918466.024sandsprite.comeuo4gOpen-source PDF analysis toolrolfr2620http://www.reddit.com/r/ReverseEngineering/comments/euo4g/opensource_pdf_analysis_tool/Falset5_2qmd0FalseFalset3_euo4ghttp://sandsprite.com/blogs/index.php?uid=7&pid=57
1273979723.022code.google.comc4nh4Faster Universal Unpacker (FUU)rolfr2422http://www.reddit.com/r/ReverseEngineering/comments/c4nh4/faster_universal_unpacker_fuu/Falset5_2qmd0FalseFalset3_c4nh4http://code.google.com/p/fuu/
1267214299.025securitytube.netb6y52Assembly Primer for Hackers (Part 1)Chomskyismyhero2835http://www.reddit.com/r/ReverseEngineering/comments/b6y52/assembly_primer_for_hackers_part_1/Falset5_2qmd0FalseFalset3_b6y52http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-1%29-System-Organization-video.aspx
1263852051.023sites.google.comar6jyBIOS ReversingHavokeachday2630http://www.reddit.com/r/ReverseEngineering/comments/ar6jy/bios_reversing/Falset5_2qmd0FalseFalset3_ar6jyhttp://sites.google.com/site/pinczakko/articles
1223843978.022chitchat.at.infoseek.co.jp76prnVMware Backdoor I/O Portdoug112352532http://www.reddit.com/r/ReverseEngineering/comments/76prn/vmware_backdoor_io_port/Falset5_2qmd0FalseFalset3_76prnhttp://chitchat.at.infoseek.co.jp/vmware/backdoor.html
1374177944.022righto.com1ikyt4Ken Shirriff's blog: Reverse-engineering the flag circuits in the 8085 processorrolfr2640http://www.reddit.com/r/ReverseEngineering/comments/1ikyt4/ken_shirriffs_blog_reverseengineering_the_flag/Falset5_2qmd0FalseFalset3_1ikyt4http://www.righto.com/2013/07/reverse-engineering-flag-circuits-in.html?m=1
1372519563.022journals.sfu.ca1hbafaThe biological microprocessor, or how to build a computer with biological parts by GHG Moe-Behrensturnersr3080http://www.reddit.com/r/ReverseEngineering/comments/1hbafa/the_biological_microprocessor_or_how_to_build_a/Falset5_2qmd0FalseFalset3_1hbafahttp://journals.sfu.ca/rncsb/index.php/csbj/article/view/csbj.201304003/272
1372028120.021rehints.com1gxm94HexRaysCodeXplorer plugin / REhints.comniko-r2540http://www.reddit.com/r/ReverseEngineering/comments/1gxm94/hexrayscodexplorer_plugin_rehintscom/Falset5_2qmd0FalseFalset3_1gxm94http://rehints.com/2013-06-18-HexRaysCodeXplorer-Announcement.html
1370805657.023gdtr.files.wordpress.com1fzvcepa_kt's half of the ASLR/timing attacks speech at SummerCon 2013 [PDF]rolfr2520http://www.reddit.com/r/ReverseEngineering/comments/1fzvce/pa_kts_half_of_the_aslrtiming_attacks_speech_at/Falset5_2qmd0FalseFalset3_1fzvcehttp://gdtr.files.wordpress.com/2013/06/leak1.pdf
1368660918.021modularcircuits.tantosonline.com1ef0d6The Cray Filesnullandnull2651http://www.reddit.com/r/ReverseEngineering/comments/1ef0d6/the_cray_files/Falset5_2qmd0FalseFalset3_1ef0d6http://modularcircuits.tantosonline.com/blog/articles/the-cray-files/
1364930085.022devttys0.com1bj8crFirmware Analysis Tool Binwalk 1.2 released: recursive scanning, entropy analysis, plugin supportrayo2nd2532http://www.reddit.com/r/ReverseEngineering/comments/1bj8cr/firmware_analysis_tool_binwalk_12_released/Falset5_2qmd0FalseFalset3_1bj8crhttp://www.devttys0.com/2013/04/binwalk-1-2-release/
1364847689.024504ensics.com1bg8jzAndroid Application (Dalvik) Memory Analysis & The Chuli Malwarejtsylve37130http://www.reddit.com/r/ReverseEngineering/comments/1bg8jz/android_application_dalvik_memory_analysis_the/Falset5_2qmd0FalseFalset3_1bg8jzhttp://www.504ensics.com/android-application-dalvik-memory-analysis-the-chuli-malware/
1363124230.024self.ReverseEngineering1a68vqSo I got a UART and cracked open an Arris WBM760A Cable Modem. Here's where I am, where to next?Z3tta29526http://www.reddit.com/r/ReverseEngineering/comments/1a68vq/so_i_got_a_uart_and_cracked_open_an_arris_wbm760a/So, being someone who can't resist picking up $1 embedded devices at yard sales, I came across an [Arris WBM760A](http://www.amazon.com/Arris-WBM760A-Touchstone-DOCSIS-Cable/dp/B006UK3K06).Two visible screws on the bottom, take them out. Then the foot to the right of the LEDs covers a warranty sticker and another screw, take that out and you're home free.Once you're in, you'll notice something beautiful. Four pinned headers, in a line, all giving out TTL voltages. I couldn't have done it without the help from [this tutorial over at dev/ttys/0](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/).So the pins in order from RJ45 connector to the LEDs are [VCC, Tx, Rx, Gnd].I hooked up a cheap $9 UART I got off of eBay, and set off to find the baud rate (I just manually guessed with putty), which turned out to be 115200. No parity, 1 stop bit, 8 data bits.. seems standard. Anyhow, I logged my putty connection and was excited to get some output: http://pastebin.com/ScQ1YaP6Now, what I've noticed is that there's a very short window where input is allowed. I hooked my multimeter to the tx line from my UART and noticed that at certain period of the boot cycle, I could type and it would display on putty, and you would see the change in voltage on the multimeter. However, after a point in time the tx line will just stay at a constant 1.625v (This could be off, I forget where I write things). So this lead me to test two.Test two was the putty-paste test, where I reset the putty console, unplugged the modem, and loaded my clipboard with 'paste!n', with the n not being literal of course. So I plugged in the modem and to my hearts content I right clicked that putty window, pasting input as quick as I could. What I found was input is allowed after line 135: Freeing init memory: 76Kuntil the ending line.I tried running processes, I tried things like echo `cat /etc/passwd > /dev/tts/0` >> /etc/scripts/z_arris_check.shI've tried, perhaps even crazier. Anyways, this is where I'm at. I wanted to write up my findings, my adventure (this is my first adventure with embedded device RE-ing), and hopefully I can get some feedback or insight where to head next.Thanks for taking the time to read, I hope you got some enjoyment out of it.Falset5_2qmd0FalseTruet3_1a68vqhttp://www.reddit.com/r/ReverseEngineering/comments/1a68vq/so_i_got_a_uart_and_cracked_open_an_arris_wbm760a/
1361423035.022self.ReverseEngineering18xqrbAcademic Research Project Ideasugrd28610http://www.reddit.com/r/ReverseEngineering/comments/18xqrb/academic_research_project_ideas/Hi, this is my first post so be gentle.I saw a post in another sub which inspired and I remember seeing a post somewhat similar to this posted here but being more focused on decompilation so I figured I would just make another.I am a CS student, still in University trying to find an academic research project and I am looking for ideas. I am interested in reverse engineering and program analysis. I have some basic experience in re and malware analysis. I am specifically interested in applications of theorem provers, SMT/SAT solvers, symbolic execution and model checkers, so I figured this is a good sub to post in. Anyway, I would be very interested and grateful for ideas, open research problems, academic papers to read, general tips or anything that might help me settle on something that would be interesting. Thanks so much for your time.Falset5_2qmd0FalseTruet3_18xqrbhttp://www.reddit.com/r/ReverseEngineering/comments/18xqrb/academic_research_project_ideas/
1357639666.023events.ccc.de166dqxThe future of protocol reversing and simulation applied on ZeroAccess botnet (29C3, CCC 2012)samcrem2746http://www.reddit.com/r/ReverseEngineering/comments/166dqx/the_future_of_protocol_reversing_and_simulation/Falset5_2qmd0FalseFalset3_166dqxhttp://events.ccc.de/congress/2012/Fahrplan/events/5256.en.html
1355519043.023self.ReverseEngineering14v115Research paper on RE law AmAIncludeSec341111http://www.reddit.com/r/ReverseEngineering/comments/14v115/research_paper_on_re_law_ama/Hi folks, my company [Include Security](http://www.IncludeSecurity.com) does a good amount of RE work and we've teamed up with a prominent technology law researcher to create a current and relevant research paper on RE laws in the US. We hope to address some important topics/questions in the hobbyist, professional, and academic RE world.So please ask all your questions here in this thread, **while this isn't a real-time AmA we'll do our best to address whatever questions/topics are up-voted the most in our research.** The paper will be completed in the upcoming months and we'll link to it on /r/ReverseEngineering [when we're done](http://i3.kym-cdn.com/photos/images/original/000/159/326/Op_will_surely_deliver_RE_Weird_Video_Game_Facts_Part_7-s500x375-138152.jpg).We're sponsoring this research because we think it's interesting, it helps our business answer some questions we had ourselves, and it's a cool way to give back to the RE community.Thanks for any input!Falset5_2qmd01355524342.0Truet3_14v115http://www.reddit.com/r/ReverseEngineering/comments/14v115/research_paper_on_re_law_ama/
1351193476.023zserge.com122ydpcucu: a compiler you can understand (1/3)nullandnull2856http://www.reddit.com/r/ReverseEngineering/comments/122ydp/cucu_a_compiler_you_can_understand_13/Falset5_2qmd0FalseFalset3_122ydphttp://zserge.com/blog/cucu-part1.html
1349315681.022self.ReverseEngineering10wtilSatellite baseband mods: Taking control of the Inmarsat GMR-2 phone terminalaelfred2644http://www.reddit.com/r/ReverseEngineering/comments/10wtil/satellite_baseband_mods_taking_control_of_the/Renowned reverse-engineers Alfredo Ortega and Sebastian Muñiz publish their latest work, RE and modification of IsatPhone Pro Inmarsat firmware, allowing them direct interaction with the satellite network.Link: http://www.groundworkstech.com/blog/ekoparty2012satellitebasebandmodsDisclaimer: I'm Alfredo Ortega.Falset5_2qmd0FalseTruet3_10wtilhttp://www.reddit.com/r/ReverseEngineering/comments/10wtil/satellite_baseband_mods_taking_control_of_the/
1348684954.021cs.purdue.edu10ipzuBrute Force Scanning of Kernel Data Structure Instances UsingGraph-based Signaturesdradu2540http://www.reddit.com/r/ReverseEngineering/comments/10ipzu/brute_force_scanning_of_kernel_data_structure/Falset5_2qmd0FalseFalset3_10ipzuhttp://www.cs.purdue.edu/homes/xyzhang/Comp/ndss11.pdf
1346399281.024code.google.comz4ja5a bit more of PEsimpleuser2621http://www.reddit.com/r/ReverseEngineering/comments/z4ja5/a_bit_more_of_pe/Falset5_2qmd0FalseFalset3_z4ja5http://code.google.com/p/corkami/wiki/HackInParis2012
1345054135.024blog.yurichev.comy9tvxFinding unknown algorithm using only input/output pairs and Z3 SMT solverrolfr2735http://www.reddit.com/r/ReverseEngineering/comments/y9tvx/finding_unknown_algorithm_using_only_inputoutput/Falset5_2qmd0FalseFalset3_y9tvxhttp://blog.yurichev.com/node/71
1344880907.021thelegendofrandom.comy5lg9Adding a message Box to a Binary Through DLL InjectionRandomNetzley36151http://www.reddit.com/r/ReverseEngineering/comments/y5lg9/adding_a_message_box_to_a_binary_through_dll/Falset5_2qmd0FalseFalset3_y5lg9http://thelegendofrandom.com/blog/archives/1656
1342657464.024blog.duosecurity.comwsgfoExploit Mitigations in Android Jelly Bean 4.1virvdova2620http://www.reddit.com/r/ReverseEngineering/comments/wsgfo/exploit_mitigations_in_android_jelly_bean_41/Falset5_2qmd0FalseFalset3_wsgfohttps://blog.duosecurity.com/2012/07/exploit-mitigations-in-android-jelly-bean-4-1/
1339884793.0240xeb.wordpress.comv5kxoDesigning a minimal operating system to emulate 32/64bits code snippets, shellcode or malware in Bochs0xeb3060http://www.reddit.com/r/ReverseEngineering/comments/v5kxo/designing_a_minimal_operating_system_to_emulate/Falset5_2qmd0FalseFalset3_v5kxohttp://0xeb.wordpress.com/2012/06/17/my-presentation-at-recon-2012-montreal/
1339774888.023blog.crowdstrike.comv3k1nCrowdStrike release CrowdRE collaborative RE plugin for IDAhellixor29617http://www.reddit.com/r/ReverseEngineering/comments/v3k1n/crowdstrike_release_crowdre_collaborative_re/Falset5_2qmd0FalseFalset3_v3k1nhttp://blog.crowdstrike.com/2012/06/join-crowd.html
1327916076.021jetbrains.comp2u9lFree -Net Decompiler by JetBrainswishi2659http://www.reddit.com/r/ReverseEngineering/comments/p2u9l/free_net_decompiler_by_jetbrains/Falset5_2qmd0FalseFalset3_p2u9lhttp://www.jetbrains.com/decompiler/
1327915975.020imrannazar.comp2u83Arm v7 and v9 Opcode Mapwishi2772http://www.reddit.com/r/ReverseEngineering/comments/p2u83/arm_v7_and_v9_opcode_map/Falset5_2qmd0FalseFalset3_p2u83http://imrannazar.com/ARM-Opcode-Map
1325525628.021acsu.buffalo.edunzxugExecutable and Linkable Format (ELF)igor_sk3090http://www.reddit.com/r/ReverseEngineering/comments/nzxug/executable_and_linkable_format_elf/Falset5_2qmd0FalseFalset3_nzxughttp://www.acsu.buffalo.edu/~charngda/elf.html
1317130787.023io.smashthestack.orgksx5eIO Smashthestack Challengessamcrem2856http://www.reddit.com/r/ReverseEngineering/comments/ksx5e/io_smashthestack_challenges/Falset5_2qmd0FalseFalset3_ksx5ehttp://io.smashthestack.org:84/
1315051588.023blog.0xbadc0de.bek3gieReversing C++ programs with IDA pro and Hex-raysrolfr2740http://www.reddit.com/r/ReverseEngineering/comments/k3gie/reversing_c_programs_with_ida_pro_and_hexrays/Falset5_2qmd0FalseFalset3_k3giehttp://blog.0xbadc0de.be/archives/67
1306974457.023self.ReverseEngineeringhpidrWhere can I get some practice files for reversing with crackmes.de down?23011http://www.reddit.com/r/ReverseEngineering/comments/hpidr/where_can_i_get_some_practice_files_for_reversing/I'm trying to get some foundational skills going this summer, but I don't have anything to practice with, and the only site I knew of is down at the moment. Any recommendations? Falset5_2qmd0FalseTruet3_hpidrhttp://www.reddit.com/r/ReverseEngineering/comments/hpidr/where_can_i_get_some_practice_files_for_reversing/
1305546805.023cs.utah.eduhch4pFinding and Understanding Bugs in C Compilers [PDF] +325 reported crashes & wrong code generationwishi2304http://www.reddit.com/r/ReverseEngineering/comments/hch4p/finding_and_understanding_bugs_in_c_compilers_pdf/Falset5_2qmd0FalseFalset3_hch4phttp://www.cs.utah.edu/~regehr/papers/pldi11-preprint.pdf
1304940015.022pid.gamecopyworld.comh798yPROTECTiON iD v6.4.02424http://www.reddit.com/r/ReverseEngineering/comments/h798y/protection_id_v640/Falset5_2qmd0FalseFalset3_h798yhttp://pid.gamecopyworld.com/
1304376001.022self.ReverseEngineeringh2n0xcrackmes.de down - 'We received an abuse mail and had to close this site. Hopefully we are back soon!'quitelikeme28611http://www.reddit.com/r/ReverseEngineering/comments/h2n0x/crackmesde_down_we_received_an_abuse_mail_and_had/Yeah, let's see how long it takes for it to come back. I'd like to know more about the abuse mail, anyone knows what's going on?Falset5_2qmd0FalseTruet3_h2n0xhttp://www.reddit.com/r/ReverseEngineering/comments/h2n0x/crackmesde_down_we_received_an_abuse_mail_and_had/
1303586123.023reddit.comgvveuI don't know if r/ReverseEngineering is interested, but there's a fairly new subreddit called r/AskEngineers that may have resources you could use (or may serve as a venue to provide your expert advice)Mumberthrax2740http://www.reddit.com/r/ReverseEngineering/comments/gvveu/i_dont_know_if_rreverseengineering_is_interested/Falset5_2qmd0FalseFalset3_gvveuhttp://www.reddit.com/r/AskEngineers/
1301523589.021self.ReverseEngineeringgf1smJob posting: developer of automated exploit generation toolsrolfr2323http://www.reddit.com/r/ReverseEngineering/comments/gf1sm/job_posting_developer_of_automated_exploit/Job Opening (Staff Programmer) We're looking for great systemsprogrammers to work on automatic program exploitation and programanalysis problems. We need strong programmers with an emphasis onsystems-level knowledge (knowing how a program gets compileddown, unix, etc.). Being able to reverse engineer binaries andwrite exploits against program binaries is a plus. Experiencewith writing compilers/optimizations, or program verification isalso a plus. We write our code in C and OCaml. The position isat Carnegie Mellon University in CyLab (www.cylab.cmu.edu) withProf. David Brumley. You'd also be working with CMU PhD studentsand undergrads. To get a sense of the security projects, visithttp://security.ece.cmu.edu. If interested, please apply athttp://www.cmu.edu/jobs to job listing 7993 or by this link:https://secured.kenexa.com/cmu/cc/CCJobResultsAction.ss?command=ViewJobDetails&job_REQUISITION_NUMBER=7993 .Falset5_2qmd0TrueTruet3_gf1smhttp://www.reddit.com/r/ReverseEngineering/comments/gf1sm/job_posting_developer_of_automated_exploit/
1300437343.020freemyipod.orgg6beqFreemyipod (A reverse engineering of iPod devices)samcrem2440http://www.reddit.com/r/ReverseEngineering/comments/g6beq/freemyipod_a_reverse_engineering_of_ipod_devices/Falset5_2qmd0FalseFalset3_g6beqhttp://www.freemyipod.org/wiki/Main_Page
1299686752.022reverse.put.asg0huaMac OS X Reversing Tutorial 2537http://www.reddit.com/r/ReverseEngineering/comments/g0hua/mac_os_x_reversing_tutorial/Falset5_2qmd0FalseFalset3_g0huahttp://reverse.put.as/wp-content/uploads/2011/02/beginners-tut-II.txt
1299496369.021bugchecker.comfyyckBugChecker - open-source SoftICE lookalike for 2k/XProlfr2874http://www.reddit.com/r/ReverseEngineering/comments/fyyck/bugchecker_opensource_softice_lookalike_for_2kxp/Falset5_2qmd0FalseFalset3_fyyckhttp://bugchecker.com/
1299099905.023blogs.msdn.comfw1upBrilliant post on x64 analysis: Challenges of Debugging optimized x64 codesimpleuser2410http://www.reddit.com/r/ReverseEngineering/comments/fw1up/brilliant_post_on_x64_analysis_challenges_of/Falset5_2qmd0FalseFalset3_fw1uphttp://blogs.msdn.com/b/ntdebugging/archive/2009/01/09/challenges-of-debugging-optimized-x64-code.aspx
1298596593.021recon.cxfs7qeUnderstanding Swizzor's Obfuscation Scheme [PDF]rolfr2211http://www.reddit.com/r/ReverseEngineering/comments/fs7qe/understanding_swizzors_obfuscation_scheme_pdf/Falset5_2qmd0FalseFalset3_fs7qehttp://recon.cx/2010/slides/Recon2010-UnderStaningSwizzorObfuscation.pdf
1296728137.021rcejunk.blogspot.comfef6cShmoocon 2011 Crypto Challenge Packsanitybit2654http://www.reddit.com/r/ReverseEngineering/comments/fef6c/shmoocon_2011_crypto_challenge_pack/Falset5_2qmd0FalseFalset3_fef6chttp://rcejunk.blogspot.com/2011/02/shmoocon-2011-crypto-challenge-pack.html
1293675844.022code.google.cometeuqIOCTL Fuzzer v1.2 - Fuzzing Tool For Windows Kernel Driverssanitybit2640http://www.reddit.com/r/ReverseEngineering/comments/eteuq/ioctl_fuzzer_v12_fuzzing_tool_for_windows_kernel/Falset5_2qmd0FalseFalset3_eteuqhttps://code.google.com/p/ioctlfuzzer/
1292076158.020media.blackhat.comek2k8Hardware is the new software - Blackhat EU 2k10 by Joe Grand << nice presentationg0dmoney2555http://www.reddit.com/r/ReverseEngineering/comments/ek2k8/hardware_is_the_new_software_blackhat_eu_2k10_by/Falset5_2qmd0FalseFalset3_ek2k8https://media.blackhat.com/bh-eu-10/presentations/Grand/BlackHat-EU-2010-Grand-Hardware-is-the-New-Software-slides.pdf
1290854113.024ubertooth.sourceforge.netecfpkProject Ubertooth, an open source wireless development platform that can be used for Bluetooth testing and research.sanitybit2731http://www.reddit.com/r/ReverseEngineering/comments/ecfpk/project_ubertooth_an_open_source_wireless/Falset5_2qmd0FalseFalset3_ecfpkhttp://ubertooth.sourceforge.net/
1290661796.023ebfe.orgebhkrTo whoever owns this site, thank you. I got a good laugh. 34119http://www.reddit.com/r/ReverseEngineering/comments/ebhkr/to_whoever_owns_this_site_thank_you_i_got_a_good/Falset5_2qmd0FalseFalset3_ebhkrhttp://ebfe.org/
1286367496.024boss.gipsa-lab.grenoble-inp.frdnjfrBreak Our Steganographic System!cavedave2845http://www.reddit.com/r/ReverseEngineering/comments/dnjfr/break_our_steganographic_system/Falset5_2qmd0FalseFalset3_dnjfrhttp://boss.gipsa-lab.grenoble-inp.fr/BOSSRank/index.php
1286311678.021blogs.sans.orgdn9in6 Hex Editors for Malware Analysisgnewman2436http://www.reddit.com/r/ReverseEngineering/comments/dn9in/6_hex_editors_for_malware_analysis/Falset5_2qmd0FalseFalset3_dn9inhttp://blogs.sans.org/computer-forensics/2010/09/29/hex-editors-for-malware-analysis/
1285318790.023duxcore.comdi8svVisual DuxDebugger - Windows 7 64-bit Debuggerwtbw2411http://www.reddit.com/r/ReverseEngineering/comments/di8sv/visual_duxdebugger_windows_7_64bit_debugger/Falset5_2qmd0FalseFalset3_di8svhttp://www.duxcore.com
1285061571.021nruns.comdgrpjHysterically funny advisory regarding an, uh,'authentication scheme' [PDF]rolfr2546http://www.reddit.com/r/ReverseEngineering/comments/dgrpj/hysterically_funny_advisory_regarding_an_uh/Falset5_2qmd0FalseFalset3_dgrpjhttp://www.nruns.com/_downloads/nruns-SA-2010-001.pdf
1283910066.021self.ReverseEngineeringdavx8Can anyone in /r/ReverseEngineering recommend me a good book/resource to start learning about this stuff?27616http://www.reddit.com/r/ReverseEngineering/comments/davx8/can_anyone_in_rreverseengineering_recommend_me_a/My Background: I'm about halfway through a BS in CS (and Math, fwiw). I'm proficient with C, C++, and Java.Falset5_2qmd0FalseTruet3_davx8http://www.reddit.com/r/ReverseEngineering/comments/davx8/can_anyone_in_rreverseengineering_recommend_me_a/
1282796025.021techblog.avira.comd5k7nHindering debugging by doing nothingbigmac27611http://www.reddit.com/r/ReverseEngineering/comments/d5k7n/hindering_debugging_by_doing_nothing/Falset5_2qmd0FalseFalset3_d5k7nhttp://techblog.avira.com/2009/07/22/hindering-debugging-by-doing-nothing/en/
1280332633.022ethicalhacker.netcuoriEthicalHacker: Intro to Reverse Engineering (Part 1)Mindsketch2311http://www.reddit.com/r/ReverseEngineering/comments/cuori/ethicalhacker_intro_to_reverse_engineering_part_1/Falset5_2qmd0FalseFalset3_cuorihttp://www.ethicalhacker.net/content/view/152/2/
1277934489.024syscalls.kernelgrok.comckpb8Linux System Call Referencekernelgork2735http://www.reddit.com/r/ReverseEngineering/comments/ckpb8/linux_system_call_reference/Falset5_2qmd0FalseFalset3_ckpb8http://syscalls.kernelgrok.com/
1274742469.023agner.orgc7phmOptimizing Code for x86 and x86-64 Family Microprocessors2411http://www.reddit.com/r/ReverseEngineering/comments/c7phm/optimizing_code_for_x86_and_x8664_family/Falset5_2qmd0FalseFalset3_c7phmhttp://agner.org/optimize/
1272924471.022f-secure.combzlokYour computer is now stoned (..again!). The rise ofMBR rootkits [PDF]rolfr2423http://www.reddit.com/r/ReverseEngineering/comments/bzlok/your_computer_is_now_stoned_again_the_rise_of_mbr/Falset5_2qmd0FalseFalset3_bzlokhttp://www.f-secure.com/weblog/archives/Kasslin-Florio-VB2008.pdf
1271221621.022hackmii.combqm9oCracking the Nintendo Kernel for Homebrewcydork2310http://www.reddit.com/r/ReverseEngineering/comments/bqm9o/cracking_the_nintendo_kernel_for_homebrew/Falset5_2qmd0FalseFalset3_bqm9ohttp://hackmii.com/2010/01/the-stm-release-exploit/?submittwice
1270701258.023geohotps3.blogspot.combnyynGeorge Hotz - OtherOS supported on 3.2100 - video demoing 'custom firmware'. ethicszen2740http://www.reddit.com/r/ReverseEngineering/comments/bnyyn/george_hotz_otheros_supported_on_32100_video/Falset5_2qmd0FalseFalset3_bnyynhttp://geohotps3.blogspot.com/2010/04/otheros-supported-on-321oo.html
1265725932.021nkb.me.uk.nyud.netazxcaModifying A UK Panasonic G10 Plasma TelevisionTo Obtain Advanced Controlswtbw2543http://www.reddit.com/r/ReverseEngineering/comments/azxca/modifying_a_uk_panasonic_g10_plasma_television_to/Falset5_2qmd0FalseFalset3_azxcahttp://www.nkb.me.uk.nyud.net/
1259018670.024sparkfun.coma7gbqFree stuff on Jan 7th from an online retailer :-OMad_Gouki3285http://www.reddit.com/r/ReverseEngineering/comments/a7gbq/free_stuff_on_jan_7th_from_an_online_retailer_o/Falset5_2qmd0FalseFalset3_a7gbqhttp://www.sparkfun.com/commerce/news.php?id=305
1258486023.022regoogle.carnivore.ita5d99RE-Google - IDA pluginwishi2424http://www.reddit.com/r/ReverseEngineering/comments/a5d99/regoogle_ida_plugin/Falset5_2qmd0FalseFalset3_a5d99http://regoogle.carnivore.it/
1244751413.021hex-rays.com8rrttIDA v5.5 is scheduled for tomorrowilfak2541http://www.reddit.com/r/ReverseEngineering/comments/8rrtt/ida_v55_is_scheduled_for_tomorrow/Falset5_2qmd0FalseFalset3_8rrtthttp://www.hex-rays.com/idapro/55/index.htm
1239117760.023gta.ufrj.br8ao6kMichelangelo source codecavedave2302http://www.reddit.com/r/ReverseEngineering/comments/8ao6k/michelangelo_source_code/Falset5_2qmd0FalseFalset3_8ao6khttp://www.gta.ufrj.br/~natalia/virus/michelangelo.txt
1237948877.021codeproject.com8798tThe Beginners Guide to Codecavescloudburst2212http://www.reddit.com/r/ReverseEngineering/comments/8798t/the_beginners_guide_to_codecaves/Falset5_2qmd0FalseFalset3_8798thttp://www.codeproject.com/KB/cpp/codecave.aspx
1233954371.021recon.cx7vgzbClassic Paper on Reverse Engineering Skype Part 2 [PDF]rolfr2210http://www.reddit.com/r/ReverseEngineering/comments/7vgzb/classic_paper_on_reverse_engineering_skype_part_2/Falset5_2qmd0FalseFalset3_7vgzbhttp://www.recon.cx/en/f/vskype-part2.pdf
1375741718.019github.com1jrrmuPyBFD: A Python interface to the GNU Binary File Descriptor (BFD) libraryigor_sk2341http://www.reddit.com/r/ReverseEngineering/comments/1jrrmu/pybfd_a_python_interface_to_the_gnu_binary_file/Falset5_2qmd0FalseFalset3_1jrrmuhttps://github.com/Groundworkstech/pybfd
1373915898.021yuhongbao.blogspot.ca1icxf5How I found CVE-2013-1310 in IE6 and IE7yuhong33120http://www.reddit.com/r/ReverseEngineering/comments/1icxf5/how_i_found_cve20131310_in_ie6_and_ie7/Falset5_2qmd0FalseFalset3_1icxf5http://yuhongbao.blogspot.ca/2013/07/how-i-found-cve-2013-1310.html
1373538485.023self.ReverseEngineering1i2m5qsearching for a PCIe WiFi SOCidaxivecro2415http://www.reddit.com/r/ReverseEngineering/comments/1i2m5q/searching_for_a_pcie_wifi_soc/Hi, can anyone suggest me a PCIe WiFi SOC that uses a known isa? (eg, mips)I'd like to try disassembling the firmware.. I know I'm crazy, but you know, you could do many interesting things with a modified firmwareFalset5_2qmd0FalseTruet3_1i2m5qhttp://www.reddit.com/r/ReverseEngineering/comments/1i2m5q/searching_for_a_pcie_wifi_soc/
1373245905.019research.microsoft.com1hu1u1Coq: The world’s best macro assembler? by Andrew Kennedy, Nick Benton, Jonas Jensen, and Pierre-Evariste Dagand [PDF]turnersr31121http://www.reddit.com/r/ReverseEngineering/comments/1hu1u1/coq_the_worlds_best_macro_assembler_by_andrew/Falset5_2qmd0FalseFalset3_1hu1u1http://research.microsoft.com/en-us/um/people/nick/coqasm.pdf
1372958731.023self.ReverseEngineering1hn6prThoughts of hiring someone skilled in RE?fldash2968http://www.reddit.com/r/ReverseEngineering/comments/1hn6pr/thoughts_of_hiring_someone_skilled_in_re/Is this legal? Is it frowned upon? Is there a place that hosts jobs for reversing? Long story short, Company of Heroes 2 had a -dev mode s few patches ago. They removed shortly before release because it because it could be used to hack Steam achievements. Understandable. They promised mod support eventually but who knows when.I'm the creator of the persistent COH1 mod Europe In Ruins. I'm trying to get started porting it to COH2. I have no interest in Steam achievements.I have opened the EXE in Hopper.app and found an Misc_IsDevMode offset that is set to 0. Changed it to 1 and patched the EXE. But it doesn't seem to do anything. Trying to attach a debugger is caught by the Sega DRM DLL and it's using more sophisticated methods than IsDebuggerPresent.You can run mods without -dev if you package them. I've also done this but there is some sort of CRC checks because my changes are read and I can see them in 1v1 skirmish vs AI, but the game abruptly ends around 30s into the match.Anyway, I'm in over my head and would like help and willing to pay if someone could complete the task.Falset5_2qmd0FalseTruet3_1hn6prhttp://www.reddit.com/r/ReverseEngineering/comments/1hn6pr/thoughts_of_hiring_someone_skilled_in_re/
1369644699.0210vercl0k.tuxfamily.org1f4nnwAES Whitebox Unboxing: No Such Problem - [PDF]0vercl0k2766http://www.reddit.com/r/ReverseEngineering/comments/1f4nnw/aes_whitebox_unboxing_no_such_problem_pdf/Falset5_2qmd0FalseFalset3_1f4nnwhttp://0vercl0k.tuxfamily.org/bl0g/Articles/AES%20Whitebox%20Unboxing:%20No%20Such%20Problem/0vercl0k_aes_whitebox_unboxing_no_such_problem.pdf
1368495079.023skisoo.com1eaai0How to Read Picasa 3.9 Database and extract faces data2xyo2960http://www.reddit.com/r/ReverseEngineering/comments/1eaai0/how_to_read_picasa_39_database_and_extract_faces/Falset5_2qmd0FalseFalset3_1eaai0http://skisoo.com/blog/en/2013/how-to-read-picasa-3-9-database-and-extract-faces/
1367481568.021llvm.org1djgcg2013 European LLVM Conference - Slide - Dagger: decompilation to LLVM IR slidestiocsti2433http://www.reddit.com/r/ReverseEngineering/comments/1djgcg/2013_european_llvm_conference_slide_dagger/Falset5_2qmd0FalseFalset3_1djgcghttp://llvm.org/devmtg/2013-04/bougacha-slides.pdf
1364369401.020jbremer.org1b3l4yCross-referencing stand-alone Dalvik Bytecodesimpleuser2553http://www.reddit.com/r/ReverseEngineering/comments/1b3l4y/crossreferencing_standalone_dalvik_bytecode/Falset5_2qmd0FalseFalset3_1b3l4yhttp://jbremer.org/cross-referencing-stand-alone-dalvik-bytecode/
1364262251.020w3.org1b0japI found a IE9 info leak for ASLR bypass by just looking further at a W3C HTML spec bug..yuhong30102http://www.reddit.com/r/ReverseEngineering/comments/1b0jap/i_found_a_ie9_info_leak_for_aslr_bypass_by_just/Falset5_2qmd0FalseFalset3_1b0japhttps://www.w3.org/Bugs/Public/show_bug.cgi?id=16757#c10
1362618078.020recon.cx19tahvREcon 2013 - CFPturnersr2330http://www.reddit.com/r/ReverseEngineering/comments/19tahv/recon_2013_cfp/Falset5_2qmd0FalseFalset3_19tahvhttp://recon.cx/2013/cfp.html
1362450034.022bap.ece.cmu.edu19ohheBinary Analysis Platform 0.7 releasededmcman29711http://www.reddit.com/r/ReverseEngineering/comments/19ohhe/binary_analysis_platform_07_released/Falset5_2qmd0FalseFalset3_19ohhehttp://bap.ece.cmu.edu/download/bap-0.7.tar.gz
1359662750.021blog.rewolf.pl17nc1uDebugging ring 3 part of PE/PE+ loaderemulb2760http://www.reddit.com/r/ReverseEngineering/comments/17nc1u/debugging_ring_3_part_of_pepe_loader/Falset5_2qmd0FalseFalset3_17nc1uhttp://blog.rewolf.pl/blog/?p=463
1355821065.021youtu.be151m5qan overview of the Portable Executable and its malformations (video)simpleuser2432http://www.reddit.com/r/ReverseEngineering/comments/151m5q/an_overview_of_the_portable_executable_and_its/Falset5_2qmd0FalseFalset3_151m5qhttp://youtu.be/kibEcaG0zCk
1355645087.022pespin.com14xnuhBugDbg , new x64 userland debugger from PESpin devniko-r2758http://www.reddit.com/r/ReverseEngineering/comments/14xnuh/bugdbg_new_x64_userland_debugger_from_pespin_dev/Falset5_2qmd0FalseFalset3_14xnuhhttp://pespin.com/
1355323194.023sitsec.net14q5jkHacking a wireless burglar alarmfr0r2851http://www.reddit.com/r/ReverseEngineering/comments/14q5jk/hacking_a_wireless_burglar_alarm/Falset5_2qmd0FalseFalset3_14q5jkhttp://sitsec.net/files/secvest_analysis.pdf
1355111150.020deroko.phearless.org14l29hPinlog: Tool for execution tracing and logging via Pin that can be imported into IDA.niko-r2440http://www.reddit.com/r/ReverseEngineering/comments/14l29h/pinlog_tool_for_execution_tracing_and_logging_via/Falset5_2qmd0FalseFalset3_14l29hhttp://deroko.phearless.org/rce.html
1354640426.022blog.ptsecurity.com149oipWindows 8 ASLR internalsGreg12212972http://www.reddit.com/r/ReverseEngineering/comments/149oip/windows_8_aslr_internals/Falset5_2qmd0FalseFalset3_149oiphttp://blog.ptsecurity.com/2012/12/windows-8-aslr-internals.html
1354486526.021cs.ox.ac.uk1463apDoctoral Studentship in the Academic Centre of Excellence in Cyber Security Research [GCHQ-sponsored Ph.D. studentship for UK nationals]rolfr2540http://www.reddit.com/r/ReverseEngineering/comments/1463ap/doctoral_studentship_in_the_academic_centre_of/Falset5_2qmd0FalseFalset3_1463aphttp://www.cs.ox.ac.uk/news/569-full.html
1352531977.021j00ru.vexillium.org12yeu4Defeating Windows Driver Signature Enforcement #2: CSRSS and thread desktopsN3mes1s2540http://www.reddit.com/r/ReverseEngineering/comments/12yeu4/defeating_windows_driver_signature_enforcement_2/Falset5_2qmd0FalseFalset3_12yeu4http://j00ru.vexillium.org/?p=1393
1352230899.021media.blackhat.com12qv4aLessons In Static Binary Analysis - Veracodeturnersr32115http://www.reddit.com/r/ReverseEngineering/comments/12qv4a/lessons_in_static_binary_analysis_veracode/Falset5_2qmd0FalseFalset3_12qv4ahttp://media.blackhat.com/bh-us-12/Briefings/Rioux/BH_US_12_Rioux_Lessons_Of_Binary_Analysis_Slides.pdf
1350466808.021reddit.com11mfmb'new kind of copy protection' being offered on redditshrillthrill442320http://www.reddit.com/r/ReverseEngineering/comments/11mfmb/new_kind_of_copy_protection_being_offered_on/Falset5_2qmd0FalseFalset3_11mfmbhttp://www.reddit.com/r/gamedev/comments/11lyuo/is_software_piracy_a_problem_for_you/
1347466516.021volatility-labs.blogspot.comzrscrUsing Volatility to analyze and enumerate Windows Desktops, Heaps, and Ransomwaretranst2870http://www.reddit.com/r/ReverseEngineering/comments/zrscr/using_volatility_to_analyze_and_enumerate_windows/Falset5_2qmd0FalseFalset3_zrscrhttp://volatility-labs.blogspot.com/2012/09/movp-13-desktops-heaps-and-ransomware.html
1332925622.023pferrie.host22.comrhbfwAnti-unpacker tricks, by Peter Ferrie (always links to the most up to date version)QvasiModo2529http://www.reddit.com/r/ReverseEngineering/comments/rhbfw/antiunpacker_tricks_by_peter_ferrie_always_links/Falset5_2qmd0FalseFalset3_rhbfwhttp://pferrie.host22.com/papers/unpackers.pdf
1330282875.020translate.google.comq6y8eThe dark side of RATP (Paris metro) ticketsethicszen2882http://www.reddit.com/r/ReverseEngineering/comments/q6y8e/the_dark_side_of_ratp_paris_metro_tickets/Falset5_2qmd0FalseFalset3_q6y8ehttp://translate.google.com/translate?sl=fr&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&layout=2&eotf=1&u=http%3A%2F%2Fvirtualabs.fr%2FLa-face-cachee-des-tickets-RATP&act=url
1328904840.023andrewl.dreamhosters.compjszkShmoocon 2012 'Blocky' (RE 400) Writeuprolfr2856http://www.reddit.com/r/ReverseEngineering/comments/pjszk/shmoocon_2012_blocky_re_400_writeup/Falset5_2qmd0FalseFalset3_pjszkhttp://andrewl.dreamhosters.com/blog/2012-02-07/
1327857650.022hcrypt.comp1tq8Homomorphic encryption libraries - libScarab (integer FHE) and shapeCPU (FHE VM, patented in Germany)rolfr2863http://www.reddit.com/r/ReverseEngineering/comments/p1tq8/homomorphic_encryption_libraries_libscarab/Falset5_2qmd0FalseFalset3_p1tq8http://www.hcrypt.com/
1325852635.021code.google.como5cnjx86 & PEcavedave2650http://www.reddit.com/r/ReverseEngineering/comments/o5cnj/x86_pe/Falset5_2qmd0FalseFalset3_o5cnjhttp://code.google.com/p/corkami/wiki/BerlinSidesX2?show=content
1318543095.022irongeek.comlbbmfDerbycon 2011 Videosigor_sk2420http://www.reddit.com/r/ReverseEngineering/comments/lbbmf/derbycon_2011_videos/Falset5_2qmd0FalseFalset3_lbbmfhttp://www.irongeek.com/i.php?page=videos/derbycon1/mainlist
1317172573.022malwarereversing.wordpress.comktl0iDebugging Injected Code with IDA Prodigduggg2752http://www.reddit.com/r/ReverseEngineering/comments/ktl0i/debugging_injected_code_with_ida_pro/Falset5_2qmd0FalseFalset3_ktl0ihttp://malwarereversing.wordpress.com/2011/09/27/debugging-injected-code-with-ida-pro/
1315602236.020t2.fikagmbt2′11 Challengeigor_sk27713http://www.reddit.com/r/ReverseEngineering/comments/kagmb/t211_challenge/Falset5_2qmd0FalseFalset3_kagmbhttp://t2.fi/challenge/t2′11-challenge/
1315052316.021blog.rewolf.plk3gozrep movsb isn’t memcpy()wishi2549http://www.reddit.com/r/ReverseEngineering/comments/k3goz/rep_movsb_isnt_memcpy/Falset5_2qmd0FalseFalset3_k3gozhttp://blog.rewolf.pl/blog/?p=177&utm_source=rss&utm_medium=rss&utm_campaign=rep-movsb-isnt-memcpy
1312993315.020cso.com.aujepg5IEEE to create anti-malware “packer” validation systemduppy25551http://www.reddit.com/r/ReverseEngineering/comments/jepg5/ieee_to_create_antimalware_packer_validation/Falset5_2qmd0FalseFalset3_jepg5http://www.cso.com.au/article/396019/ieee_create_anti-malware_packer_validation_system/
1312307889.022hexblog.comj6w95Practical C++ Decompilation: slides and video (Recon 2011)igor_sk2531http://www.reddit.com/r/ReverseEngineering/comments/j6w95/practical_c_decompilation_slides_and_video_recon/Falset5_2qmd0FalseFalset3_j6w95http://www.hexblog.com/?p=432
1310538127.021code.google.comio7dta summary of PDF tricks - encodings, structures, javascript..simpleuser2210http://www.reddit.com/r/ReverseEngineering/comments/io7dt/a_summary_of_pdf_tricks_encodings_structures/Falset5_2qmd0FalseFalset3_io7dthttp://code.google.com/p/corkami/wiki/PDFTricks
1307976235.023research.microsoft.comhyj7iDebugger Canvas, a free Power Tool that adds Code Bubbles™ to Visual Studio for a new way to debug. [looks interesting]atworkbored2527http://www.reddit.com/r/ReverseEngineering/comments/hyj7i/debugger_canvas_a_free_power_tool_that_adds_code/Falset5_2qmd0FalseFalset3_hyj7ihttp://research.microsoft.com/en-us/projects/debuggercanvas/
1306809899.022recon.cxhnx5lRecon training - Binary Literacy: Static Reverse Engineering - Rolf Rolles22010http://www.reddit.com/r/ReverseEngineering/comments/hnx5l/recon_training_binary_literacy_static_reverse/Falset5_2qmd0FalseFalset3_hnx5lhttp://recon.cx/2011/training1.html
1306255414.021vimeo.comhj0g5Nick Harbour How to Break Disassemblers NoVa Hackers May 2011wishi2549http://www.reddit.com/r/ReverseEngineering/comments/hj0g5/nick_harbour_how_to_break_disassemblers_nova/Falset5_2qmd0FalseFalset3_hj0g5http://vimeo.com/23602994
1305622620.021blogs.technet.comhd8suAnalysis of the Obfuscations used by Win32/Alureonnewgre2102http://www.reddit.com/r/ReverseEngineering/comments/hd8su/analysis_of_the_obfuscations_used_by_win32alureon/Falset5_2qmd0FalseFalset3_hd8suhttp://blogs.technet.com/b/mmpc/archive/2011/05/15/win32-alureon-brings-back-old-school-virus-techniques-enhanced.aspx
1304130099.022github.comh0la9.NET Decompilation [PDF, Master's thesis]rolfr2422http://www.reddit.com/r/ReverseEngineering/comments/h0la9/net_decompilation_pdf_masters_thesis/Falset5_2qmd0FalseFalset3_h0la9https://github.com/icsharpcode/ILSpy/raw/master/doc/Dissertation/Dissertation.pdf
1297553690.022recon.cxfka4uThe slides from RECon 2010 have finally materializedrolfr2533http://www.reddit.com/r/ReverseEngineering/comments/fka4u/the_slides_from_recon_2010_have_finally/Falset5_2qmd0FalseFalset3_fka4uhttp://recon.cx/2010/speakers.html
1296666136.019red-gate.comfdwan.NET Reflector no longer free with version 7 due out in Marchmauvehead22311http://www.reddit.com/r/ReverseEngineering/comments/fdwan/net_reflector_no_longer_free_with_version_7_due/Falset5_2qmd0FalseFalset3_fdwanhttp://www.red-gate.com/products/dotnet-development/reflector/announcement
1296579242.021deroko.phearless.orgfd659Deroko of ARTeam - Tools and Code Repo2321http://www.reddit.com/r/ReverseEngineering/comments/fd659/deroko_of_arteam_tools_and_code_repo/Falset5_2qmd0FalseFalset3_fd659http://deroko.phearless.org/index.html
1296212224.021cvo-lab.blogspot.comfao03Opensource cryptanalysis libraryadesnos2542http://www.reddit.com/r/ReverseEngineering/comments/fao03/opensource_cryptanalysis_library/Falset5_2qmd0FalseFalset3_fao03http://cvo-lab.blogspot.com/2010/11/new-release-of-megiddo-open-source.html
1292517067.021breakingpointsystems.comemvkqWhen A DoS Isn't A DoS - BreakingPoint2544http://www.reddit.com/r/ReverseEngineering/comments/emvkq/when_a_dos_isnt_a_dos_breakingpoint/Falset5_2qmd0FalseFalset3_emvkqhttp://www.breakingpointsystems.com/community/blog/ie-vulnerability/
1292267159.021blackhat.comel5peReversing C++ [PDF]usualsuspect2540http://www.reddit.com/r/ReverseEngineering/comments/el5pe/reversing_c_pdf/Falset5_2qmd0FalseFalset3_el5pehttp://www.blackhat.com/presentations/bh-dc-07/Sabanal_Yason/Presentation/bh-dc-07-Sabanal_Yason.pdf
1291843735.021yury.nameeiitiProgram Obfuscation and Cryptography Course2430http://www.reddit.com/r/ReverseEngineering/comments/eiiti/program_obfuscation_and_cryptography_course/Falset5_2qmd0FalseFalset3_eiitihttp://yury.name/obfuscation/
1291473494.019bunniestudios.comeg4tzUSA v. Crippen — A Retrospectivesanitybit2343http://www.reddit.com/r/ReverseEngineering/comments/eg4tz/usa_v_crippen_a_retrospective/Falset5_2qmd0FalseFalset3_eg4tzhttp://www.bunniestudios.com/blog/?p=1472
1288036239.021theknotter.netdw8dtARM Linux Shellcode2760http://www.reddit.com/r/ReverseEngineering/comments/dw8dt/arm_linux_shellcode/Falset5_2qmd0FalseFalset3_dw8dthttp://www.theknotter.net/arm-linux-shellcode/
1285791923.020jack-mannino.blogspot.comdko95reversing android apps - blogwishi2332http://www.reddit.com/r/ReverseEngineering/comments/dko95/reversing_android_apps_blog/Falset5_2qmd0FalseFalset3_dko95http://jack-mannino.blogspot.com/2010/09/reversing-android-apps-101.html
1267826664.020phreedom.orgb9tfzCreating the smallest possible PE executable2336http://www.reddit.com/r/ReverseEngineering/comments/b9tfz/creating_the_smallest_possible_pe_executable/Falset5_2qmd0FalseFalset3_b9tfzhttp://www.phreedom.org/solar/code/tinype/
1264646478.022events.ccc.deav0vt26C3: cat /proc/sys/net/ipv4/fuckups - A Talk about some network related fuckups and how to exploit them in a theoretical attack against a company network (links to mpeg4 video of the talk at bottom of the page)the-fritz2534http://www.reddit.com/r/ReverseEngineering/comments/av0vt/26c3_cat_procsysnetipv4fuckups_a_talk_about_some/Falset5_2qmd0FalseFalset3_av0vthttp://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
1259058335.020cs.jhu.edua7m76Generating shellcode which looks like English text [PDF]cdman2331http://www.reddit.com/r/ReverseEngineering/comments/a7m76/generating_shellcode_which_looks_like_english/Falset5_2qmd0FalseFalset3_a7m76http://www.cs.jhu.edu/~sam/ccs243-mason.pdf
1258672330.020rohitab.coma67qqAPI Monitor is a software that monitors and displays API calls made by applications.24410http://www.reddit.com/r/ReverseEngineering/comments/a67qq/api_monitor_is_a_software_that_monitors_and/Falset5_2qmd0FalseFalset3_a67qqhttp://www.rohitab.com/apimonitor
1257251749.022news.electricalchemy.neta0huwThe Cost of Password Brute Forcing on Amazon's EC2 Cloudfacuman2313http://www.reddit.com/r/ReverseEngineering/comments/a0huw/the_cost_of_password_brute_forcing_on_amazons_ec2/Falset5_2qmd0FalseFalset3_a0huwhttp://news.electricalchemy.net/2009/10/password-cracking-in-cloud-part-5.html
1256142020.021vimeo.com9wbg6Reverse Engineering for Vulnerability Analysis 102 (Silberman/Portnoy, video)wtbw2542http://www.reddit.com/r/ReverseEngineering/comments/9wbg6/reverse_engineering_for_vulnerability_analysis/Falset5_2qmd0FalseFalset3_9wbg6http://vimeo.com/7177233
1247058270.020youtube.com8z9zmGraphical interpretation of a file - with depth informationirid2776http://www.reddit.com/r/ReverseEngineering/comments/8z9zm/graphical_interpretation_of_a_file_with_depth/Falset5_2qmd0FalseFalset3_8z9zmhttp://www.youtube.com/watch?v=5f7hZBoEwV0
1243373531.022steike.com8nft4Spotify vs OllyDbgcloudburst2420http://www.reddit.com/r/ReverseEngineering/comments/8nft4/spotify_vs_ollydbg/Falset5_2qmd0FalseFalset3_8nft4http://www.steike.com/code/spotify-vs-ollydbg/
1234115769.021code.google.com7vt4nThe StuffIt X archive format, and a requestMarshallBanana2439http://www.reddit.com/r/ReverseEngineering/comments/7vt4n/the_stuffit_x_archive_format_and_a_request/Falset5_2qmd0FalseFalset3_7vt4nhttp://code.google.com/p/theunarchiver/wiki/SitxSpecs
1375973915.019shell-storm.org1jyimbTaint analysis and pattern matching with Pin - PoC for Funjonathansalwan2120http://www.reddit.com/r/ReverseEngineering/comments/1jyimb/taint_analysis_and_pattern_matching_with_pin_poc/Falset5_2qmd0FalseFalset3_1jyimbhttp://shell-storm.org/blog/Taint-analysis-and-pattern-matching-with-Pin/
1375381315.022blog.malwarebytes.org1jid9mSophos Discovers ZeroAccess Using RLOCecileMBAM2861http://www.reddit.com/r/ReverseEngineering/comments/1jid9m/sophos_discovers_zeroaccess_using_rlo/Falset5_2qmd0FalseFalset3_1jid9mhttp://blog.malwarebytes.org/intelligence/2013/08/sophos-discovers-zeroaccess-using-rlo/
1374557218.021bugsdujour.com1iv85nAll of my bugs.commentguy12327610http://www.reddit.com/r/ReverseEngineering/comments/1iv85n/all_of_my_bugs/Falset5_2qmd0FalseFalset3_1iv85nhttp://www.bugsdujour.com/release/
1371086775.021self.ReverseEngineering1g8kzcHDD Firmware: Where to StartHabstinat26517http://www.reddit.com/r/ReverseEngineering/comments/1g8kzc/hdd_firmware_where_to_start/ As the owner of a Lemote Yeeloong and an ardent free software supporter, I won't lie: I like [free software](https://gnu.org/philosophy/free-sw.html), and I want all the software I run to be free. I've done some research on the components of the Yeeloong and, contrary to what most might think, I've discovered that even the Yeeloong isn't completely free, although it's still the closest thing we've got to it as of yet. There are two components which still contain nonfree firmware on the Yeeloong:0. The embedded controller, and0. The HDD (320GB SATA).At least there's a start for the embedded controller, as a project to replace it ([OpenEC](http://wiki.laptop.org/go/OpenEC)) already exists and the gNewSense developers are working to port it to the Yeeloong. So let's make this post about HDD firmware.After asking around a little, I was very suprised to find that not only do *all* HDDs and *all* SSDs require firmware, but also that not a single company has released or leaked their hard drive firmware source code, and not a single person has made any notable attempt to replace their hard drive's firmware with a custom-hacked-up-version of their own firmware. The effects of designing a free software HDD firmware replacement will not only be ethical, though; others have thought of a few pragmatic consequences:* Prevent problems like [this firmware bug, which essentially bricks your HDD unless you have a serial adapter](http://hackaday.com/2012/07/30/recovering-from-a-seagate-hdd-firmware-bug/) from happening ahead of time* Make data forensics easier by providing more detailed debug commandsI'm sure there are other practical benefits as well; you can think them up yourself. So what I'd like to do is reverse engineer current HDD firmwares to develop a free (as in freedom) replacement firmware for HDDs (and maybe also SSDs). The craziest part: Going into this, I'm so clueless that I don't even know the extent of the ambition in this project.My question is explained in the title of this post -- Where do I start? Here's a brief description of my technical background so far:* I own the 'The C Programming Language' by Kerninghan and Richie (2nd edition) and I've read through and understand the basic core of C, although I haven't gotten into the later more in-depth chapters on pointers and other features yet. * I know the basics of GNU/Linux (Debian and Arch-based).* I once tried to learn MIPS assembly via a Wikibook, but I was only able to grind through so much before getting confused and moving on. I think the book was designed more for those who already know another assembly language.For those that don't know, the Yeeloong is a MIPS machine, so I don't know how valuable learning x86 assembly would be.Am I correct in assuming that my first step would be building or buying an [RS232-to-TTL adapter](https://sites.google.com/site/seagatefix/) and testing out sending commands to my hard drive? Does anyone here know any information about the role of firmware on an HDD? What exactly does firmware need to do, and what can it optionally do? I suppose a large part of the job would be downloading, extracting, and decompiling firmware updates from WD's website; what machine language would you suppose they would be written in? Not x86, right? Has anyone had any similar experience and advice to share? I'm only a sophomore in highschool, so any pointers would be great. I anticipate myself having a lot of time to work on this throughout the school year; I already have allocated a lot of my schedule next year to an independent study, and the more I think about it the more I'd like to spend it working on this. Here are some random statistics on the HDD in the Yeeloong, if they're needed: # hdparm -i /dev/sda /dev/sda: Model=WDC WD3200BPVT-00HXZT3, FwRev=01.01A01, SerialNo=WD-WXS1E62PXXT9 Config={ HardSect NotMFM HdSw>15uSec SpinMotCtl Fixed DTR>5Mbs FmtGapReq } RawCHS=16383/16/63, TrkSize=0, SectSize=0, ECCbytes=50 BuffType=unknown, BuffSize=8192kB, MaxMultSect=16, MultSect=16 CurCHS=16383/16/63, CurSects=16514064, LBA=yes, LBAsects=625142448 IORDY=on/off, tPIO={min:120,w/IORDY:120}, tDMA={min:120,rec:120} PIO modes: pio0 pio3 pio4 DMA modes: mdma0 mdma1 mdma2 UDMA modes: udma0 udma1 *udma2 udma3 udma4 udma5 udma6 AdvancedPM=yes: unknown setting WriteCache=enabled Drive conforms to: Unspecified: ATA/ATAPI-1,2,3,4,5,6,7 * signifies the current active mode # lshw -class disk -class storage *-ide description: IDE interface product: CS5536 [Geode companion] IDE vendor: Advanced Micro Devices [AMD] physical id: e.2 bus info: pci@0000:00:0e.2 version: 01 width: 32 bits clock: 33MHz capabilities: ide bus_master configuration: driver=pata_cs5536 latency=64 maxlatency=64 resources: irq:14 ioport:1f0(size=8) ioport:3f6 ioport:170(size=8) ioport:376 ioport:4c60(size=16) *-scsi:0 physical id: 2 logical name: scsi0 capabilities: emulated *-disk description: ATA Disk product: WDC WD3200BPVT-0 vendor: Western Digital physical id: 0.0.0 bus info: scsi@0:0.0.0 logical name: /dev/sda version: 01.0 serial: WD-WXS1E62PXXT9 size: 298GiB (320GB) capabilities: partitioned partitioned:dos configuration: ansiversion=5 signature=73eefab3Thanks an awful lot for helping me out, reverse engineering gurus of Reddit. Falset5_2qmd01371089047.0Truet3_1g8kzchttp://www.reddit.com/r/ReverseEngineering/comments/1g8kzc/hdd_firmware_where_to_start/
1370887001.020poppopret.org1g23w9Summercon 2013: Hacking the Withings WS-30stormehh2550http://www.reddit.com/r/ReverseEngineering/comments/1g23w9/summercon_2013_hacking_the_withings_ws30/Falset5_2qmd0FalseFalset3_1g23w9http://www.poppopret.org/?p=305
1370760441.020citeseerx.ist.psu.edu1fyyrdA Model for Self-Modifying Code [PDF]perror32123http://www.reddit.com/r/ReverseEngineering/comments/1fyyrd/a_model_for_selfmodifying_code_pdf/Falset5_2qmd0FalseFalset3_1fyyrdhttp://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.70.8328&rep=rep1&type=pdf
1369344682.020blog.firefart.net1exhkrAnalyzing HP Thinpro FirmwareFireFart2550http://www.reddit.com/r/ReverseEngineering/comments/1exhkr/analyzing_hp_thinpro_firmware/Falset5_2qmd0FalseFalset3_1exhkrhttp://blog.firefart.net/2013/05/analyzing-hp-thinpro-firmware.html
1366575544.020hooked-on-mnemonics.blogspot.com1ctgieHooked on Mnemonics Worked for Me: reiat.py - Using>1365732666.020conference.hitb.org1c6hbb'Bringing Dutch alarm systems to their knees' - elementary mistakes in alarm communication protocols.cybergibbons2440http://www.reddit.com/r/ReverseEngineering/comments/1c6hbb/bringing_dutch_alarm_systems_to_their_knees/Falset5_2qmd0FalseFalset3_1c6hbbhttp://conference.hitb.org/hitbsecconf2013ams/materials/D1T2%20-%20Wilco%20Baan%20Hofman%20-%20Bringing%20Dutch%20Alarm%20Systems%20to%20Their%20Knees.pdf
1361902946.020wired.com199sgvSymantec's dossier on Stuxnet 0.5, circa 2007 [PDF]rolfr2330http://www.reddit.com/r/ReverseEngineering/comments/199sgv/symantecs_dossier_on_stuxnet_05_circa_2007_pdf/Falset5_2qmd0FalseFalset3_199sgvhttp://www.wired.com/images_blogs/threatlevel/2013/02/Whitepaper-Stuxnet-0.5-The-Missing-Link-1-copy.pdf
1360124397.019self.ReverseEngineering17zbeyTrying to add extra code into a binarysylocybin2784http://www.reddit.com/r/ReverseEngineering/comments/17zbey/trying_to_add_extra_code_into_a_binary/So I want to preface this by saying that I'm self-taught to a fair extent and still learning, so I apologize if I missed something obvious. I also apologize for the formatting; I haven't figured out how to paste blocks of fixed-width font..I have a basic Hello World program in C (./hello), and I'm trying to add a section of code to it. My goal is to add code that will execute before the original program does.I'm using objcopy to do this - first, I wrote assembly instructions (jump.s) to represent my added code (currently just a jump to 0x8048000), and assembled this with gcc -c jump.s. I then called objcopy --add-section mysection=jump.o --set-section-flags mysection=alloc,code --change-section-address mysection=0xXXXXXXXXwhere XXXXXXXX represents the largest address I see if I run 'readelf -S hello' plus the size of that section (so the last section that has a nonzero value in the Addr field).Unfortunately, if I change the entry point of the program to the beginning of mysection, the code that's there is not at all what it should be, even though if I look at it under gdb before running it, the proper instructions are there. Thus, something is happening before jumping to the entry point that overwrites the memory in that location.Unfortunately, the only documentation I've been able to find of objcopy is a list of the command-line options (which are rather unclear to someone of my experience level), and I feel like I just have no idea what's going on anymore. If someone could at least point me in the right direction, that would be really helpful.Falset5_2qmd0FalseTruet3_17zbeyhttp://www.reddit.com/r/ReverseEngineering/comments/17zbey/trying_to_add_extra_code_into_a_binary/
1355996163.019bitbucket.org155sfude4dot v2.0.0 .NET deobfuscator/unpacker34052230http://www.reddit.com/r/ReverseEngineering/comments/155sfu/de4dot_v200_net_deobfuscatorunpacker/Falset5_2qmd0FalseFalset3_155sfuhttps://bitbucket.org/0xd4d/de4dot/overview
1354203077.021blog.eset.com13zvwvInterconnection of Gauss with Stuxnet, Duqu & Flamegoonmaster2650http://www.reddit.com/r/ReverseEngineering/comments/13zvwv/interconnection_of_gauss_with_stuxnet_duqu_flame/Falset5_2qmd0FalseFalset3_13zvwvhttp://blog.eset.com/2012/08/15/interconnection-of-gauss-with-stuxnet-duqu-flame
1353420951.022gcc.repzret.org13ic6uGCC Explorer (interactive compiler)samcrem2645http://www.reddit.com/r/ReverseEngineering/comments/13ic6u/gcc_explorer_interactive_compiler/Falset5_2qmd0FalseFalset3_13ic6uhttp://gcc.repzret.org/
1351981303.021slideshare.net12l1jwan overview of the Portable Executable and its malformationssimpleuser2540http://www.reddit.com/r/ReverseEngineering/comments/12l1jw/an_overview_of_the_portable_executable_and_its/Falset5_2qmd0FalseFalset3_12l1jwhttp://www.slideshare.net/ange4771/ange-albertini-hashdays2012extended
1345326662.020self.ReverseEngineeringyg16cLooking for a 'Reverse Engineer Wanted' list of sorts (volunteer/open source - not employment)regrunt2556http://www.reddit.com/r/ReverseEngineering/comments/yg16c/looking_for_a_reverse_engineer_wanted_list_of/Does anybody know of any todo-lists with protocols/file formats for bored REs with too much free time? Ideally something a bit more accessible and in demand than old DOS business apps or the image format for some medical scanner (been there).I know the first suggestion always is to 'scratch your own itch', but everything I use is either open source or at least open standards - so no itches. Over the years, I've cracked the encryption and analyzed the netcode of a handful of apps and games/MMOs, wrote viewers for their proprietary file formats, etc. and always greatly enjoyed doing that but that was usually just for me personally and I'd love to see someone actually benefit from this.Falset5_2qmd0FalseTruet3_yg16chttp://www.reddit.com/r/ReverseEngineering/comments/yg16c/looking_for_a_reverse_engineer_wanted_list_of/
1343510006.020jbremer.orgxba99Detecting Uninitialized Memory Read Access Bugs using Pin (a la Valgrind)rolfr2660http://www.reddit.com/r/ReverseEngineering/comments/xba99/detecting_uninitialized_memory_read_access_bugs/Falset5_2qmd0FalseFalset3_xba99http://jbremer.org/detecting-uninitialized-memory-read-access-bugs-using-pin-a-la-valgrind/
1342657511.020pnx-tf.blogspot.comwsgh8Introducing: IDAscope virvdova2881http://www.reddit.com/r/ReverseEngineering/comments/wsgh8/introducing_idascope/Falset5_2qmd0FalseFalset3_wsgh8http://pnx-tf.blogspot.com/2012/07/introducing-idascope.html
1342566820.019f-secure.comwq8jfMulti-platform Backdoor with Intel OS X Binary.virvdova2341http://www.reddit.com/r/ReverseEngineering/comments/wq8jf/multiplatform_backdoor_with_intel_os_x_binary/Falset5_2qmd0FalseFalset3_wq8jfhttp://www.f-secure.com/weblog/archives/00002400.html
1340823663.020blog.spiderlabs.comvp66lAnalyzing PDF Malware - Part 3B (Shellcode Edition) - SpiderLabs AnteriorRnast2551http://www.reddit.com/r/ReverseEngineering/comments/vp66l/analyzing_pdf_malware_part_3b_shellcode_edition/Falset5_2qmd0FalseFalset3_vp66lhttp://blog.spiderlabs.com/2012/06/analyzing-pdf-malware-part-3b.html
1340531002.019esec-lab.sogeti.comviq86Bypassing ASLR and DEP on Adobe Reader Xwtbw2560http://www.reddit.com/r/ReverseEngineering/comments/viq86/bypassing_aslr_and_dep_on_adobe_reader_x/Falset5_2qmd0FalseFalset3_viq86http://esec-lab.sogeti.com/post/Bypassing-ASLR-and-DEP-on-Adobe-Reader-X
1340384850.022ftp.cs.wisc.eduvfymmBinary-Code Obfuscations in Prevalent Packer Tools [pdf]NateLawson2421http://www.reddit.com/r/ReverseEngineering/comments/vfymm/binarycode_obfuscations_in_prevalent_packer_tools/Falset5_2qmd0FalseFalset3_vfymmftp://ftp.cs.wisc.edu/paradyn/papers/Roundy12Packers.pdf
1340046195.020openrce.orgv8j7nRECON 2012 Keynote: The Case for Semantics-Based Methods in Reverse Engineeringrolfr2772http://www.reddit.com/r/ReverseEngineering/comments/v8j7n/recon_2012_keynote_the_case_for_semanticsbased/Falset5_2qmd0FalseFalset3_v8j7nhttp://www.openrce.org/blog/view/2182/RECON_2012_Keynote:__The_Case_for_Semantics-Based_Methods_in_Reverse_Engineering
1339523974.020support.microsoft.comuyafmHow to debug Windows servicesSpirotot2337http://www.reddit.com/r/ReverseEngineering/comments/uyafm/how_to_debug_windows_services/Falset5_2qmd0FalseFalset3_uyafmhttp://support.microsoft.com/kb/824344
1333312158.020wilrobertson.comrofoqweekend du hackigor_sk2221http://www.reddit.com/r/ReverseEngineering/comments/rofoq/weekend_du_hack/Falset5_2qmd0FalseFalset3_rofoqhttp://wilrobertson.com/blog/2012/03/weekend-du-hack
1332863359.019dumas.ccsd.cnrs.frrfz4cStatic Analysis of x86 Assembly: Certification and Robustness Analysis [PDF]rolfr2560http://www.reddit.com/r/ReverseEngineering/comments/rfz4c/static_analysis_of_x86_assembly_certification_and/Falset5_2qmd0FalseFalset3_rfz4chttp://dumas.ccsd.cnrs.fr/docs/00/63/64/45/PDF/Laporte.pdf
1323566940.019self.ReverseEngineeringn7ztjStarting a RE BlogNickCano27811http://www.reddit.com/r/ReverseEngineering/comments/n7ztj/starting_a_re_blog/So, I'm starting a Reverse Engineering blog. I already have two posts, and I will hopefully be posting much more material, tutorials and code. For anyone who is interested in checking it out and hopefully sharing it, here is the link: http://revpp.blogspot.com/Falset5_2qmd0FalseTruet3_n7ztjhttp://www.reddit.com/r/ReverseEngineering/comments/n7ztj/starting_a_re_blog/
1315496755.019packetstormsecurity.orgk8wxgInline Hooking in Windows [PDF]wishi2671http://www.reddit.com/r/ReverseEngineering/comments/k8wxg/inline_hooking_in_windows_pdf/Falset5_2qmd0FalseFalset3_k8wxghttp://packetstormsecurity.org/files/view/104905/inline_hooking_in_windows.pdf
1314172899.020vxheavens.comjsoarValhalla VX zine, issue #1 (August 2011)rolfr2447http://www.reddit.com/r/ReverseEngineering/comments/jsoar/valhalla_vx_zine_issue_1_august_2011/Falset5_2qmd0FalseFalset3_jsoarhttp://www.vxheavens.com/vx.php?id=zv18
1312362670.020zynamics.comj7l0tBinDiff and BinNavi on sale again -- 200 USD and 400 USD respectively :-)tdullien25528http://www.reddit.com/r/ReverseEngineering/comments/j7l0t/bindiff_and_binnavi_on_sale_again_200_usd_and_400/Falset5_2qmd0FalseFalset3_j7l0thttp://www.zynamics.com/software.html
1308055497.020cdn.ly.tlhzcu4OpenConflict: Preventing Real Time Map Hacks in Online Games [PDF]rolfr2556http://www.reddit.com/r/ReverseEngineering/comments/hzcu4/openconflict_preventing_real_time_map_hacks_in/Falset5_2qmd0FalseFalset3_hzcu4http://cdn.ly.tl/publications/openconflict-paper-sp-2011.pdf
1307461058.019self.ReverseEngineeringhtsvwWhat do your environments look like?atworkbored22330http://www.reddit.com/r/ReverseEngineering/comments/htsvw/what_do_your_environments_look_like/What kind of computer, OS, is in use around here? What method is used when reversing? Sandboxing (vm? software?)? Other tips and tricks one might have picked up that they care to share to mitigate others from making the same?Thanks all.Falset5_2qmd0FalseTruet3_htsvwhttp://www.reddit.com/r/ReverseEngineering/comments/htsvw/what_do_your_environments_look_like/
1306361373.020blog.regehr.orghk5bfA Guide to Undefined Behavior in C and C++2110http://www.reddit.com/r/ReverseEngineering/comments/hk5bf/a_guide_to_undefined_behavior_in_c_and_c/Falset5_2qmd0FalseFalset3_hk5bfhttp://blog.regehr.org/archives/213
1306242033.018recon.cxhiv10Recon 2011 lineupigor_sk2244http://www.reddit.com/r/ReverseEngineering/comments/hiv10/recon_2011_lineup/Falset5_2qmd0FalseFalset3_hiv10http://recon.cx/2011/schedule/index.en.html
1304997240.021rohitab.comh7ug9API Hooking/In-Process Patching/Memory Reading in Pythondigduggg2547http://www.reddit.com/r/ReverseEngineering/comments/h7ug9/api_hookinginprocess_patchingmemory_reading_in/Falset5_2qmd0FalseFalset3_h7ug9http://www.rohitab.com/discuss/topic/37018-api-hooking-in-python/
1304609438.018secunia.comh4vgcAdobe Flash Player 0-day Exploit Analysis (CVE-2011-0611) - Secunia2461http://www.reddit.com/r/ReverseEngineering/comments/h4vgc/adobe_flash_player_0day_exploit_analysis/Falset5_2qmd0FalseFalset3_h4vgchttps://secunia.com/blog/210/
1302731786.022pcmag.comgpeiuSony settles its lawsuit against GeoHot, apparently also dismisses suit against fail0verflow members; no precedent setrolfr2864http://www.reddit.com/r/ReverseEngineering/comments/gpeiu/sony_settles_its_lawsuit_against_geohot/Falset5_2qmd0FalseFalset3_gpeiuhttp://www.pcmag.com/article2/0,2817,2383390,00.asp
1296341443.019twitter.comfbj1pRECon will return in 2011rolfr2450http://www.reddit.com/r/ReverseEngineering/comments/fbj1p/recon_will_return_in_2011/Falset5_2qmd0FalseFalset3_fbj1phttp://twitter.com/attractr/status/31470032248639488
1295731787.019blackhat.comf77oaBlack Hat DC 2011 Briefings - Papers & Slides2340http://www.reddit.com/r/ReverseEngineering/comments/f77oa/black_hat_dc_2011_briefings_papers_slides/Falset5_2qmd0FalseFalset3_f77oahttp://www.blackhat.com/html/bh-dc-11/bh-dc-11-archives.html
1293756015.019events.ccc.deetx9eConsole Hacking 2010 [PDF]rolfr2230http://www.reddit.com/r/ReverseEngineering/comments/etx9e/console_hacking_2010_pdf/Falset5_2qmd0FalseFalset3_etx9ehttp://events.ccc.de/congress/2010/Fahrplan/attachments/1780_27c3_console_hacking_2010.pdf
1293415387.019events.ccc.deeru1uEmbedded Analysis - 27C3 public wikig0dmoney2230http://www.reddit.com/r/ReverseEngineering/comments/eru1u/embedded_analysis_27c3_public_wiki/Falset5_2qmd0FalseFalset3_eru1uhttp://events.ccc.de/congress/2010/wiki/Embedded_Analysis
1291583825.019ece.cmu.eduegot5AEG: Automatic Exploit Generation [PDF]rolfr2014http://www.reddit.com/r/ReverseEngineering/comments/egot5/aeg_automatic_exploit_generation_pdf/Falset5_2qmd0FalseFalset3_egot5http://www.ece.cmu.edu/~aavgerin/papers/aeg-ndss-2011.pdf
1291040616.022jon.oberheide.orgedbrxExploiting stack overflows in the linux kernelcydork2426http://www.reddit.com/r/ReverseEngineering/comments/edbrx/exploiting_stack_overflows_in_the_linux_kernel/Falset5_2qmd0FalseFalset3_edbrxhttp://jon.oberheide.org/blog/2010/11/29/exploiting-stack-overflows-in-the-linux-kernel/
1289849096.020sunbeltblog.blogspot.come6j2cSunbelt Blog: How the TLD4 rootkit gets around driver signing policy on a 64-bit machinegnewman2001http://www.reddit.com/r/ReverseEngineering/comments/e6j2c/sunbelt_blog_how_the_tld4_rootkit_gets_around/Falset5_2qmd0FalseFalset3_e6j2chttp://sunbeltblog.blogspot.com/2010/11/how-tld4-rootkit-gets-around-driver.html
1285168314.020pentest.cryptocity.netdhdehCode Audits 101 2224http://www.reddit.com/r/ReverseEngineering/comments/dhdeh/code_audits_101/Falset5_2qmd0FalseFalset3_dhdehhttp://pentest.cryptocity.net/code-audits/code-audits-101.html
1284841536.021dirty-joe.comdfqezdirtyJOE - Java Overall Editor (editor and viewer for compiled java binaries)wtbw2320http://www.reddit.com/r/ReverseEngineering/comments/dfqez/dirtyjoe_java_overall_editor_editor_and_viewer/Falset5_2qmd0FalseFalset3_dfqezhttp://dirty-joe.com
1284378056.020github.comdd5mg Emokit: Hacking the Emotiv EPOC Brain-Computer InterfaceOmega1912443http://www.reddit.com/r/ReverseEngineering/comments/dd5mg/emokit_hacking_the_emotiv_epoc_braincomputer/Falset5_2qmd0FalseFalset3_dd5mghttp://github.com/daeken/Emokit/blob/master/Announcement.md
1284153442.019gdeglin.blogspot.comdc9c2Reverse engineering the latest Facebook wormwtbw2450http://www.reddit.com/r/ReverseEngineering/comments/dc9c2/reverse_engineering_the_latest_facebook_worm/Falset5_2qmd0FalseFalset3_dc9c2http://gdeglin.blogspot.com/2010/09/reverse-engineering-latest-facebook.html
1283174931.020spritesmods.comd77n7Taking apart an iStorage Disk Genie (including security mechanism analysis)2222http://www.reddit.com/r/ReverseEngineering/comments/d77n7/taking_apart_an_istorage_disk_genie_including/Falset5_2qmd0FalseFalset3_d77n7http://spritesmods.com/?art=diskgenie
1282171231.022acc.umu.sed2rssPortable Executable File Format – A Reverse Engineer View [10MB PDF] 2531http://www.reddit.com/r/ReverseEngineering/comments/d2rss/portable_executable_file_format_a_reverse/Falset5_2qmd0FalseFalset3_d2rsshttp://www.acc.umu.se/~vwg/CBM_1_2_2006_Goppit_PE_Format_Reverse_Engineer_View.pdf
1280236315.021samuelkerr.comcu7fwReverse Engineering the Master Boot Record Rants, Rambles, and Rhinosstkerr2548http://www.reddit.com/r/ReverseEngineering/comments/cu7fw/reverse_engineering_the_master_boot_record_rants/Falset5_2qmd0FalseFalset3_cu7fwhttp://samuelkerr.com/?p=262
1279826804.021self.ReverseEngineeringcsl2eAny possibility of a Reverse Engineering class on UofR?Mindsketch22116http://www.reddit.com/r/ReverseEngineering/comments/csl2e/any_possibility_of_a_reverse_engineering_class_on/I realize that there is a lot of information out there pertaining to Reverse Engineering but I think it would be interesting to have a class to share ideas, offer help, etc. I know myself and probably a few other people would be more than willing to sign up. Is there any way one of you reversers would be interested in doing such a thing? Falset5_2qmd0FalseTruet3_csl2ehttp://www.reddit.com/r/ReverseEngineering/comments/csl2e/any_possibility_of_a_reverse_engineering_class_on/
1272512178.022self.ReverseEngineeringbxk9uAdministrivia: the RE reddit has had its 1000th submissionrolfr2424http://www.reddit.com/r/ReverseEngineering/comments/bxk9u/administrivia_the_re_reddit_has_had_its_1000th/The reverse engineering reddit has just had its one-thousandth submission. Thanks to everybody who helps make this place as hard-core technical as it is, particularly those who submit good content and/or engage in meaningful discussions, and also the readers and moderators.Falset5_2qmd0FalseTruet3_bxk9uhttp://www.reddit.com/r/ReverseEngineering/comments/bxk9u/administrivia_the_re_reddit_has_had_its_1000th/
1271847158.019security.dico.unimi.itbu1nlHyperDbgwishi2124http://www.reddit.com/r/ReverseEngineering/comments/bu1nl/hyperdbg/Falset5_2qmd0FalseFalset3_bu1nlhttp://security.dico.unimi.it/hyperdbg/
1269795541.022cr0.orgbjcq6There's a party at ring0 (and you're invited) [PDF]wtbw2315http://www.reddit.com/r/ReverseEngineering/comments/bjcq6/theres_a_party_at_ring0_and_youre_invited_pdf/Falset5_2qmd0FalseFalset3_bjcq6http://www.cr0.org/paper/to-jt-party-at-ring0.pdf
1267027369.021self.ReverseEngineeringb5ytuAsk ReverseEngineering: How long does it usually take experienced reverse engineers to reverse an unknown packer/protection?mahmoudimus23218http://www.reddit.com/r/ReverseEngineering/comments/b5ytu/ask_reverseengineering_how_long_does_it_usually/I understand this is probably a function of heuristics, but I am currently tackling an unknown protection (something I discovered in the wild) that is proving harder than what I've previously encountered.Besides stepping line-by-line in assembly, which is what I'm doing right now, are there any faster/more efficient ways to go about doing this?Thanks!Falset5_2qmd0FalseTruet3_b5ytuhttp://www.reddit.com/r/ReverseEngineering/comments/b5ytu/ask_reverseengineering_how_long_does_it_usually/
1264093896.019secureworks.comasgqpOperation Aurora: Clues in the Coderolfr2121http://www.reddit.com/r/ReverseEngineering/comments/asgqp/operation_aurora_clues_in_the_code/Falset5_2qmd0FalseFalset3_asgqphttp://www.secureworks.com/research/blog/index.php/2010/01/20/operation-aurora-clues-in-the-code/
1259951658.020ollydbg.deab5u7OllyDbg v2.0 Beta 2 Final Released [ZIP]wtbw2222http://www.reddit.com/r/ReverseEngineering/comments/ab5u7/ollydbg_v20_beta_2_final_released_zip/Falset5_2qmd0FalseFalset3_ab5u7http://www.ollydbg.de/odbg200k.zip
1256642353.018fortiguard.com9y766Smashing Adobe's Heap Memory Management Systems for Profit -- a nice, meaty writeup on the recent PDF exploitrolfr2240http://www.reddit.com/r/ReverseEngineering/comments/9y766/smashing_adobes_heap_memory_management_systems/Falset5_2qmd0FalseFalset3_9y766http://www.fortiguard.com/analysis/pdfanalysis.html
1240260503.020graphics.stanford.edu8e0euBit Twiddling Hacksrolfr2000http://www.reddit.com/r/ReverseEngineering/comments/8e0eu/bit_twiddling_hacks/Falset5_2qmd0FalseFalset3_8e0euhttp://graphics.stanford.edu/~seander/bithacks.html
1373505064.017pp.ipd.kit.edu1i1s4alibFirm - graph-based IR, optimizations, and code generation C libraryigor_sk1920http://www.reddit.com/r/ReverseEngineering/comments/1i1s4a/libfirm_graphbased_ir_optimizations_and_code/Falset5_2qmd0FalseFalset3_1i1s4ahttp://pp.ipd.kit.edu/firm/
1373245637.018research.microsoft.com1hu1ixUsing Coq to generate and reason about x86 systems code by Nick Benton, Jonas Jensen, Andrew Kennedy [PDF]turnersr2681http://www.reddit.com/r/ReverseEngineering/comments/1hu1ix/using_coq_to_generate_and_reason_about_x86/Falset5_2qmd0FalseFalset3_1hu1ixhttp://research.microsoft.com/en-us/um/people/akenn/coq/LOLA2012.pdf
1372454198.020hackinparis.com1h9uwzMaking an ARM TrustZone rootkit [PDF]igor_sk2554http://www.reddit.com/r/ReverseEngineering/comments/1h9uwz/making_an_arm_trustzone_rootkit_pdf/Falset5_2qmd0FalseFalset3_1h9uwzhttps://www.hackinparis.com/sites/hackinparis.com/files/Slidesthomasroth.pdf
1369168225.019blog.accuvantlabs.com1esc56Pwn2Own 2013: Java 7 SE Memory Corruptionf00sp4m2670http://www.reddit.com/r/ReverseEngineering/comments/1esc56/pwn2own_2013_java_7_se_memory_corruption/Falset5_2qmd0FalseFalset3_1esc56http://blog.accuvantlabs.com/blog/jdrake/pwn2own-2013-java-7-se-memory-corruption
1369143637.018computer-forensics.sans.org1erh0rTools for Examining XOR Obfuscation for Malware Analysisperror2469http://www.reddit.com/r/ReverseEngineering/comments/1erh0r/tools_for_examining_xor_obfuscation_for_malware/Falset5_2qmd0FalseFalset3_1erh0rhttp://computer-forensics.sans.org/blog/2013/05/14/tools-for-examining-xor-obfuscation-for-malware-analysis
1364312313.019stewin.org1b1nxyUnderstanding DMA malware [PDF]ffffdddddssss2010http://www.reddit.com/r/ReverseEngineering/comments/1b1nxy/understanding_dma_malware_pdf/Falset5_2qmd0FalseFalset3_1b1nxyhttp://www.stewin.org/papers/dimvap15-stewin.pdf
1363173340.017maxwellsci.com1a7jwsA Novel Disassemble Algorithm Designed for Malicious Filesimpleuser27105http://www.reddit.com/r/ReverseEngineering/comments/1a7jws/a_novel_disassemble_algorithm_designed_for/Falset5_2qmd0FalseFalset3_1a7jwshttp://maxwellsci.com/print/rjaset/v5-2053-2058.pdf
1361042928.017self.ReverseEngineering18nfsiA fun little tutorialCrankyFlamingo2363http://www.reddit.com/r/ReverseEngineering/comments/18nfsi/a_fun_little_tutorial/Decided to check out the Cheat Engine tutorial - very fun, recommend it.(Gets installed with the program. Be sure to un-tick the search bar optional addons)http://www.cheatengine.org/Falset5_2qmd0FalseTruet3_18nfsihttp://www.reddit.com/r/ReverseEngineering/comments/18nfsi/a_fun_little_tutorial/
1359397872.021arcfn.com17fwf4Reverse-engineering the Intel 8085 ALUigor_sk2650http://www.reddit.com/r/ReverseEngineering/comments/17fwf4/reverseengineering_the_intel_8085_alu/Falset5_2qmd0FalseFalset3_17fwf4http://www.arcfn.com/2013/01/inside-alu-of-8085-microprocessor.html
1358099309.021self.ReverseEngineering16hz9zTest Suite for Disassemblers?94c323211http://www.reddit.com/r/ReverseEngineering/comments/16hz9z/test_suite_for_disassemblers/Is anyone aware of a test suite that can be used to evaluate a disassembler? In particular, I'm interested in the x86.Falset5_2qmd0FalseTruet3_16hz9zhttp://www.reddit.com/r/ReverseEngineering/comments/16hz9z/test_suite_for_disassemblers/
1352723592.019reversingonwindows.blogspot.it132657An Example for Hidden NULL Pointer BugN3mes1s2890http://www.reddit.com/r/ReverseEngineering/comments/132657/an_example_for_hidden_null_pointer_bug/Falset5_2qmd0FalseFalset3_132657http://reversingonwindows.blogspot.it/2012/11/an-example-for-hidden-null-pointer-bug.html?spref=tw
1352166325.021waleedassar.blogspot.com12pbqvSizeOfStackReserve As Anti-Attaching Trickwaliedassar2324http://www.reddit.com/r/ReverseEngineering/comments/12pbqv/sizeofstackreserve_as_antiattaching_trick/Falset5_2qmd0FalseFalset3_12pbqvhttp://waleedassar.blogspot.com/2012/11/sizeofstackreserve-as-anti-attaching.html
1349885352.019volatility-labs.blogspot.com1199vhPhalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkittranst2560http://www.reddit.com/r/ReverseEngineering/comments/1199vh/phalanx_2_revealed_using_volatility_to_analyze_an/Falset5_2qmd0FalseFalset3_1199vhhttp://volatility-labs.blogspot.com/2012/10/phalanx-2-revealed-using-volatility-to.html
1345840622.019self.ReverseEngineeringyru6pReverse Engineering Network Protocolssecunder2787http://www.reddit.com/r/ReverseEngineering/comments/yru6p/reverse_engineering_network_protocols/I'm fairly new to the reverse engineering scene (and programming in general) but find it to be extremely fun. I've found a large amount of resource for reverse engineering binaries. But is there a different method for reversing network packets? Such as using wireshark? Or is it easier to reverse the binary and see how it is constructing packets?Falset5_2qmd0FalseTruet3_yru6phttp://www.reddit.com/r/ReverseEngineering/comments/yru6p/reverse_engineering_network_protocols/
1344303284.018ctftime.orgxss3iCTF calendar and team statsigor_sk2682http://www.reddit.com/r/ReverseEngineering/comments/xss3i/ctf_calendar_and_team_stats/Falset5_2qmd0FalseFalset3_xss3ihttp://ctftime.org/
1344124138.017opensecuritytraining.infoxox31A new OpenSecurityTraining class on Malware REOpenSecurityTraining2143http://www.reddit.com/r/ReverseEngineering/comments/xox31/a_new_opensecuritytraining_class_on_malware_re/Falset5_2qmd0FalseFalset3_xox31http://opensecuritytraining.info/ChangeBlog/Entries/2012/8/4_New_class_added__Reverse_Engineering_Malware.html
1344055736.019hex-rays.comxnpy7Hex-Rays 2012 Plugin Contest still openigor_sk2010http://www.reddit.com/r/ReverseEngineering/comments/xnpy7/hexrays_2012_plugin_contest_still_open/Falset5_2qmd0FalseFalset3_xnpy7http://www.hex-rays.com/contests/index.shtml
1343331350.018citizenlab.orgx7feaFrom Bahrain With Love: FinFisher’s Spy Kit Exposed? – The Citizen Labigor_sk2350http://www.reddit.com/r/ReverseEngineering/comments/x7fea/from_bahrain_with_love_finfishers_spy_kit_exposed/Falset5_2qmd0FalseFalset3_x7feahttps://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/
1342993938.020self.ReverseEngineeringwzezkHelp with Getting into the RE IndustryChuuy23327http://www.reddit.com/r/ReverseEngineering/comments/wzezk/help_with_getting_into_the_re_industry/I'm a 17 year old who is attending Bradley University next semester as a computer science major. I slowly started programming and reverse engineering on my own time about five years ago and I have learned that I have a true passion for these activities. However, even though I love programming, my true love is for reverse engineering. When I want to grow up, I want to be a reverse engineer.The problem is that I have no idea how to get myself into that industry. Unlike programming in which programmers are literally everywhere, reverse engineers are rare. I have never met anybody who has interest in low-level code such as assembly, let alone a reverse engineer. I have searched for reverse engineering job applications and internships, but as you can imagine, these applications are rare and have high requirements. I simply do not know how to find an internship or entry-level job that can give me experience with reverse engineering.Another problem is that I am not sure how to display my reverse engineering abilities. I have had a couple of programming jobs in the past and while I am sure that experience will help me find any type of job, I do not feel like it is enough to show employers that I am a competent reverse engineer. Most of the things I have reverse engineered include games, anti-cheats, a few viruses, a few applications, and a few crackmes. Apart from reverse engineering viruses, I do not believe any of the things that I have reverse engineered can be looked at as professional because my activities can be viewed as immoral or even illegal. Everything I have reverse engineered was primarily to learn and to practice something I enjoy doing, but also because I wanted to hack/crack an application or because I wanted to satisfy my curiosity. If programmers want to have something truly professional on their resume, they can always contribute to open source or start a project that can help people. I was wondering if there was something similar that a reverse engineer could do.I was wondering if a professional within the industry could give a young reverse engineer some advice. Thanks for reading,~ChuuyFalset5_2qmd0FalseTruet3_wzezkhttp://www.reddit.com/r/ReverseEngineering/comments/wzezk/help_with_getting_into_the_re_industry/
1342388830.017blog.eset.comwlz4zRovnix bootkit framework updated. Details about polymorphic VBR encryption, hidden FS changes and new payload (by @matrosov)virvdova2251http://www.reddit.com/r/ReverseEngineering/comments/wlz4z/rovnix_bootkit_framework_updated_details_about/Falset5_2qmd0FalseFalset3_wlz4zhttp://blog.eset.com/2012/07/13/rovnix-bootkit-framework-updated
1340657867.019hexblog.comvlb6vCompiler Internals: Exceptions and RTTI -- by igor_sk [PDF]rolfr2011http://www.reddit.com/r/ReverseEngineering/comments/vlb6v/compiler_internals_exceptions_and_rtti_by_igor_sk/Falset5_2qmd0FalseFalset3_vlb6vhttp://www.hexblog.com/wp-content/uploads/2012/06/Recon-2012-Skochinsky-Compiler-Internals.pdf
1337194325.018jbremer.orgtqclqIntercepting System Calls on x86_64 Windowsjbremer23515http://www.reddit.com/r/ReverseEngineering/comments/tqclq/intercepting_system_calls_on_x86_64_windows/Falset5_2qmd0FalseFalset3_tqclqhttp://jbremer.org/intercepting-system-calls-on-x86_64-windows/
1335927334.019youtube.comt2notLessons Of Static Binary Analysis [Video]sourceconference2344http://www.reddit.com/r/ReverseEngineering/comments/t2not/lessons_of_static_binary_analysis_video/Falset5_2qmd0FalseFalset3_t2nothttps://www.youtube.com/watch?v=GoLhiAAcuKU
1332065254.021self.ReverseEngineeringr1wifSilicon Pr0n: IC Reverse Engineering Wikinmesisgeek26519http://www.reddit.com/r/ReverseEngineering/comments/r1wif/silicon_pr0n_ic_reverse_engineering_wiki/Wiki for reverse engineering of ICs and electronics hardware. We're recruiting, contributors are welcome!EDIT: The link got corrupted somehow, NoScript might have been at fault. http://siliconpr0n.org/Falset5_2qmd0TrueTruet3_r1wifhttp://www.reddit.com/r/ReverseEngineering/comments/r1wif/silicon_pr0n_ic_reverse_engineering_wiki/
1331855577.017dvlabs.tippingpoint.comqyky7Pwn2Own Challenges: Heapsprays are for the 99%rolfr2583http://www.reddit.com/r/ReverseEngineering/comments/qyky7/pwn2own_challenges_heapsprays_are_for_the_99/Falset5_2qmd0FalseFalset3_qyky7http://dvlabs.tippingpoint.com/blog/2012/03/15/pwn2own-2012-challenge-writeup
1331669896.017people.sdev-group.comqv1bcHacking Windows CE driver implementations for fun and profitBruceJillis2471http://www.reddit.com/r/ReverseEngineering/comments/qv1bc/hacking_windows_ce_driver_implementations_for_fun/Falset5_2qmd0FalseFalset3_qv1bchttp://people.sdev-group.com/twright/?p=26
1331029976.018openrce.orgqk096[video] Semi-Automated Input Crafting by Symbolic Execution, with an Application to Automatic Key Generator Generationrolfr2027http://www.reddit.com/r/ReverseEngineering/comments/qk096/video_semiautomated_input_crafting_by_symbolic/Falset5_2qmd0FalseFalset3_qk096http://www.openrce.org/blog/view/2049/[video]_Semi-Automated_Input_Crafting_by_Symbolic_Execution,_with_an_Application_to_Automatic_Key_Generator_Generation
1328482614.020self.ReverseEngineeringpcdwnOS X VM CrackMenilbytes2447http://www.reddit.com/r/ReverseEngineering/comments/pcdwn/os_x_vm_crackme/I've written a small OS X VM CrackMe and am curious to see how easily people can break it. I've sent it off to a few people already but wanted to see what some of the RE minds here were able to do. Here it is: http://www.mediafire.com/?vr8zs43nfq0l8g8Feel free to post name/code combos for proof or source to a keygen. I'm also willing to answer any questions about it so ask away.Falset5_2qmd0TrueTruet3_pcdwnhttp://www.reddit.com/r/ReverseEngineering/comments/pcdwn/os_x_vm_crackme/
1327926443.018cs.berkeley.edup2xfpAnalysis-Resistant Malware [PDF]rolfr2241http://www.reddit.com/r/ReverseEngineering/comments/p2xfp/analysisresistant_malware_pdf/Falset5_2qmd0FalseFalset3_p2xfphttp://www.cs.berkeley.edu/~dawnsong/papers/20_analysis_resistant.pdf
1324321115.020syprog.blogspot.comnirwdListing loaded shared objects in Linuxpraddo24416http://www.reddit.com/r/ReverseEngineering/comments/nirwd/listing_loaded_shared_objects_in_linux/Falset5_2qmd0FalseFalset3_nirwdhttp://syprog.blogspot.com/2011/12/listing-loaded-shared-objects-in-linux.html
1318437351.020self.ReverseEngineeringl9pfdStatic analysis for searching backdoorsXY201131111http://www.reddit.com/r/ReverseEngineering/comments/l9pfd/static_analysis_for_searching_backdoors/Static analysis may be used both for good and for bad purposes. Since code analysis helps developers to detect buffer overflows, stack overflows and other similar defects, an intruder can also do such things. By studying weak points of software, a hacker can choose an object for attack faster. That is, he does not need to review a huge amount of code - a static analyzer will do a part of work for him. It will tell him where the code is especially vulnerable so that the hacker may go on to the next stage of his work, i.e. estimating if he can use the code defects found for his purposes and how.It seems to me, many of the errors, described in these articles are vulnerable:[Chromium]( http://www.viva64.com/en/a/0074/)[Miranda](http://www.viva64.com/en/a/0070/)[Apache HTTP Server](http://www.viva64.com/en/b/0105/)What do you think of it?Falset5_2qmd0FalseTruet3_l9pfdhttp://www.reddit.com/r/ReverseEngineering/comments/l9pfd/static_analysis_for_searching_backdoors/
1314594828.018code.google.comjxomdOpen Source database of android malwaresadesnos2350http://www.reddit.com/r/ReverseEngineering/comments/jxomd/open_source_database_of_android_malwares/Falset5_2qmd0FalseFalset3_jxomdhttp://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares
1314187169.021code.google.comjss53APKInspector Android GUI Tooldigduggg2650http://www.reddit.com/r/ReverseEngineering/comments/jss53/apkinspector_android_gui_tool/Falset5_2qmd0FalseFalset3_jss53http://code.google.com/p/apkinspector/
1313184205.018reddit.comjh5ibNew subreddit: /r/RELeaks (see comment for details)rolfr2685http://www.reddit.com/r/ReverseEngineering/comments/jh5ib/new_subreddit_rreleaks_see_comment_for_details/Falset5_2qmd0FalseFalset3_jh5ibhttp://www.reddit.com/r/RELeaks/
1311278976.018eprint.iacr.orgiw58fOn the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks [PDF]2351http://www.reddit.com/r/ReverseEngineering/comments/iw58f/on_the_vulnerability_of_fpga_bitstream_encryption/Falset5_2qmd0FalseFalset3_iw58fhttp://eprint.iacr.org/2011/390.pdf
1309189728.020community.rapid7.comiaervMS11-030: Exploitable or Not?2227http://www.reddit.com/r/ReverseEngineering/comments/iaerv/ms11030_exploitable_or_not/Falset5_2qmd0FalseFalset3_iaervhttps://community.rapid7.com/community/metasploit/blog/2011/06/27/ms11-030-exploitable-or-not
1307996881.018self.ReverseEngineeringhysxkJob: Security Analyst and an Atari 2600 Crack-medionthegod22413http://www.reddit.com/r/ReverseEngineering/comments/hysxk/job_security_analyst_and_an_atari_2600_crackme/My company, Independent Security Evaluators, needs to fill some 'security analyst' positions. The positions require some reverse engineering skills. That makes /r/reverseengineering a good place to search for candidates.We're a small consulting company based in Baltimore, MD. Moving to Baltimore is supposed to be required, but you never know. If you only know Baltimore from 'The Wire', don't discount it yet. Send me an e-mail if your only hold-up is Baltimore.The job is quite diverse. Over the last year, this group has done a handful of binary DRM audits for consumer devices, a few desktop binary audits, some binary mobile application audits, a few source audits (C/C++/C#/Python) and 2 web app audits. The ability to get into and understand an unknown codebase quickly is useful. We also do some vulnerability discovery stuff, if you're into that. The company was started by a Johns Hopkins professor and his students, so there is a focus on research and learning -- you will have some time each week to dedicate to research and publishing your work is encouraged. A large majority of the jobs we get are interesting enough and weird enough to hold my fleeting attention. Feel free to send me an e-mail and we can discuss ISE further:dion@securityevaluators.comI'll also respond to comments on this thread. Much of the work we've done recently has been 'embedded'. Lots of ARM, but we've done MIPS, SH4, and other weirder things in the past. As an excuse to learn more about the Atari 2600, I created a crack-me to help you figure out if you'd like the kind of work we do. It also lets you work on something that isn't locked into your preferred platform (unless you're some kind of weirdo).The challenge can be found here:http://pastebin.com/CtPKn9bpNOTE: This little challenge isn't a required part of the application process to ISE. I just wanted an excuse to spend my research hours playing with a video game system :) Additionally, if you like the crack-me, then you should like the job.Ops, I assume job postings are alright. If not, no hard feelings when you delete the thread.EDIT 1:We don't do cleared work and, AFAIK, there is no plan to go that route.Falset5_2qmd0TrueTruet3_hysxkhttp://www.reddit.com/r/ReverseEngineering/comments/hysxk/job_security_analyst_and_an_atari_2600_crackme/
1305502957.018self.ReverseEngineeringhc4ytNintendo 3DS Securitydionthegod2463http://www.reddit.com/r/ReverseEngineering/comments/hc4yt/nintendo_3ds_security/I've read that the 3DS contains some security features to brick a device found to be using a pirate cart or firmware (see: http://ds.ign.com/articles/112/1124753p1.html).I've done a very small amount of searching with no luck; does anyone have any pointers to information about the 3DS hardware/firmware features present?I'm not interested in cart piracy. I *am* interested in accurate and detailed information about the system and it's capabilities.Falset5_2qmd0FalseTruet3_hc4ythttp://www.reddit.com/r/ReverseEngineering/comments/hc4yt/nintendo_3ds_security/
1304412421.020self.ReverseEngineeringh30g0How do *you* transfer knowledge from one IDB to another ?simpleuser23310http://www.reddit.com/r/ReverseEngineering/comments/h30g0/how_do_you_transfer_knowledge_from_one_idb_to/there are many possibilities, but I would like to know which one *you* actually use: Flirt ? .MAP ? export .IDB to .IDC ? Bincrowd ? Python script ? CollabREate ?and what do you transfer:only names and comments ? + enum and structs ? more (register renaming, code collapsing..) ?Falset5_2qmd0FalseTruet3_h30g0http://www.reddit.com/r/ReverseEngineering/comments/h30g0/how_do_you_transfer_knowledge_from_one_idb_to/
1301560896.020marcoramilli.blogspot.comgfeecPE Infector - simple Windows PE infectionswishi2220http://www.reddit.com/r/ReverseEngineering/comments/gfeec/pe_infector_simple_windows_pe_infections/Falset5_2qmd0FalseFalset3_gfeechttp://marcoramilli.blogspot.com/2011/03/pe-infector.html
1300464441.021intellectualheaven.comg6ifaStraceNT - A System Call Tracer for Windows 2215http://www.reddit.com/r/ReverseEngineering/comments/g6ifa/stracent_a_system_call_tracer_for_windows/Falset5_2qmd0FalseFalset3_g6ifahttp://www.intellectualheaven.com/default.asp?BH=projects&H=strace.htm
1296803305.018self.ReverseEngineeringff26vAlternatives to IDA?someone1323515http://www.reddit.com/r/ReverseEngineering/comments/ff26v/alternatives_to_ida/So, I was wondering recently if there were any good alternatives to IDA for static analysis? I'm not too worried about disassembling anything except PE files on Windows, so does anyone know of or use anything else? I also don't mind if it has no debugger - I'm solely concerned with static analysis.Slightly related to this: does anyone know the algorithm (general idea, specifics, any information at all) that IDA uses? The free version won't let me disassemble itself, so I'm unable to determine what type of algorithm it uses. It's clearly some type of recursive disassembly, not linear-sweep, and it is pretty good at dealing with 'broken' code.Thanks in advance!Falset5_2qmd0TrueTruet3_ff26vhttp://www.reddit.com/r/ReverseEngineering/comments/ff26v/alternatives_to_ida/
1294567130.020geohot.comeywvcGeohot releases PS3 3.55 jailbreakethicszen30103http://www.reddit.com/r/ReverseEngineering/comments/eywvc/geohot_releases_ps3_355_jailbreak/Falset5_2qmd0FalseFalset3_eywvchttp://geohot.com/?ps3jailbreak
1293942633.018thomascannon.neteusrfAndroid Reverse Engineering Primersanitybit2240http://www.reddit.com/r/ReverseEngineering/comments/eusrf/android_reverse_engineering_primer/Falset5_2qmd0FalseFalset3_eusrfhttp://thomascannon.net/projects/android-reversing/
1293236182.018self.ReverseEngineeringer3zxAny good jobs in binary analysis and software security?danreynaud24624http://www.reddit.com/r/ReverseEngineering/comments/er3zx/any_good_jobs_in_binary_analysis_and_software/I'll start: as an associate specialist in binary analysis at UC Berkeley, I earn $48k a year. It's not great given the price of housing in the Bay Area but it's a temporary academic position and the actual work is fantastic. I would be glad to hear about how other people are doing.EDIT: this post is not about getting a new job, it's about the people out there doing this professionally. Please describe:* your current job title* your income* the pros and cons of your current positionFalset5_2qmd0TrueTruet3_er3zxhttp://www.reddit.com/r/ReverseEngineering/comments/er3zx/any_good_jobs_in_binary_analysis_and_software/
1288810961.019inreverse.nete0rp0JaZeus: When Zeus meets Java inreverse2230http://www.reddit.com/r/ReverseEngineering/comments/e0rp0/jazeus_when_zeus_meets_java/Falset5_2qmd0FalseFalset3_e0rp0http://www.inreverse.net/?p=1551
1285670374.018dcs.ics.forth.grdjxjiGPU assisted Malwarewishi2243http://www.reddit.com/r/ReverseEngineering/comments/djxji/gpu_assisted_malware/Falset5_2qmd0FalseFalset3_djxjihttp://dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf
1279436266.019self.ReverseEngineeringcqu0nGood Resources for Learning Reverse Engineering?aw4lly21211http://www.reddit.com/r/ReverseEngineering/comments/cqu0n/good_resources_for_learning_reverse_engineering/Hey,I'm looking at learning how to reverse engineer software and was wondering how I should go about learning. What tips and tricks people have that helped them to learn.I was also wondering what resources people use. What software, forums, websites, tutorials etc help you in reverse engineering software.ThanksFalset5_2qmd0FalseTruet3_cqu0nhttp://www.reddit.com/r/ReverseEngineering/comments/cqu0n/good_resources_for_learning_reverse_engineering/
1267768346.018self.ReverseEngineeringb9iezAskREddit: Ubisoft's new DRM, any idea how it was broken?voltagex23522http://www.reddit.com/r/ReverseEngineering/comments/b9iez/askreddit_ubisofts_new_drm_any_idea_how_it_was/From what I have read:* Safedisc was initially emulated, then removed from games* Starforce was run and broken in some kind of VM * Steam's DRM can be un-linked from an executable somehow.Does anyone have any ideas how Ubisoft's new scheme was broken? I find all this stuff incredibly interesting, it's just a shame it has to be so shady and 'underground'Falset5_2qmd0FalseTruet3_b9iezhttp://www.reddit.com/r/ReverseEngineering/comments/b9iez/askreddit_ubisofts_new_drm_any_idea_how_it_was/
1266141698.019david.carne.cab1w00Reverse Engineering the iPod Shuffle 3G headphone remote protocolwtbw2127http://www.reddit.com/r/ReverseEngineering/comments/b1w00/reverse_engineering_the_ipod_shuffle_3g_headphone/Falset5_2qmd0FalseFalset3_b1w00http://david.carne.ca/shuffle_hax/shuffle_remote.html
1260372363.019self.ReverseEngineeringact4oAsk RE Reddit: I'm writing a disassembler, what are the features you would like to have?23432http://www.reddit.com/r/ReverseEngineering/comments/act4o/ask_re_reddit_im_writing_a_disassembler_what_are/Ideas are welcome. Patchs and code are more than welcome :)For early access to a very 'green' version of it you can go to:http://github.com/agustingianni/DisassemblerFalset5_2qmd0FalseTruet3_act4ohttp://www.reddit.com/r/ReverseEngineering/comments/act4o/ask_re_reddit_im_writing_a_disassembler_what_are/
1259185363.018codeplex.coma870nEasyHook - The reinvention of Windows API Hooking2022http://www.reddit.com/r/ReverseEngineering/comments/a870n/easyhook_the_reinvention_of_windows_api_hooking/Falset5_2qmd0FalseFalset3_a870nhttp://www.codeplex.com/easyhook
1256381203.020the-interweb.com9xazoToad Houses Disassembled - Programming stuffwishi2000http://www.reddit.com/r/ReverseEngineering/comments/9xazo/toad_houses_disassembled_programming_stuff/Falset5_2qmd0FalseFalset3_9xazohttp://www.the-interweb.com/serendipity/index.php?/archives/127-Toad-Houses-Disassembled.html
1253147824.021bitblaze.cs.berkeley.edu9lapyIt's Christmas, kiddies -- BitBlaze's Vine was released todayrolfr2324http://www.reddit.com/r/ReverseEngineering/comments/9lapy/its_christmas_kiddies_bitblazes_vine_was_released/Falset5_2qmd0FalseFalset3_9lapyhttp://bitblaze.cs.berkeley.edu/vine.html
1248579632.021reddit.com94lskwinternals (sub-reddit): Windows OS internals and programming2210http://www.reddit.com/r/ReverseEngineering/comments/94lsk/winternals_subreddit_windows_os_internals_and/Falset5_2qmd0FalseFalset3_94lskhttp://www.reddit.com/r/winternals/
1248461132.020monstersgotmy.net94a41Pex - Software Cracker?reidhoch2881http://www.reddit.com/r/ReverseEngineering/comments/94a41/pex_software_cracker/Falset5_2qmd0FalseFalset3_94a41http://monstersgotmy.net/post/Pex-Software-Cracker.aspx
1242133451.019pagetable.com8jtouReverse-Engineering DOS 1.0 - Part 2: IBMBIO.COMphn1x2341http://www.reddit.com/r/ReverseEngineering/comments/8jtou/reverseengineering_dos_10_part_2_ibmbiocom/Falset5_2qmd0FalseFalset3_8jtouhttp://www.pagetable.com/?p=184
1233954357.018recon.cx7vgz7Classic Paper on Reverse Engineering Skype Part 1 [PDF]rolfr1910http://www.reddit.com/r/ReverseEngineering/comments/7vgz7/classic_paper_on_reverse_engineering_skype_part_1/Falset5_2qmd0FalseFalset3_7vgz7http://www.recon.cx/en/f/vskype-part1.pdf
1223384837.019cigital.com75oz4How We Learned to Cheat at Online Pokercavedave2231http://www.reddit.com/r/ReverseEngineering/comments/75oz4/how_we_learned_to_cheat_at_online_poker/Falset5_2qmd0FalseFalset3_75oz4http://www.cigital.com/papers/download/developer_gambling.php
1222249143.021rootsecure.net737lecoca-cola vending machine manual (pdf)cavedave2433http://www.reddit.com/r/ReverseEngineering/comments/737le/cocacola_vending_machine_manual_pdf/Falset5_2qmd0FalseFalset3_737lehttp://www.rootsecure.net/content/downloads/pdf/coca-cola_evs2_programming.pdf
1374786773.0190vercl0k.tuxfamily.org1j1ydsKryptonite, an proof-of-concept, open-source, LLVM obfuscating compilerrolfr2230http://www.reddit.com/r/ReverseEngineering/comments/1j1yds/kryptonite_an_proofofconcept_opensource_llvm/Falset5_2qmd0FalseFalset3_1j1ydshttp://0vercl0k.tuxfamily.org/bl0g/?p=260
1370871554.020diablo.elis.ugent.be1g1kq7Diablo Is A Link-time Optimizer for Obfuscation and more..perror2331http://www.reddit.com/r/ReverseEngineering/comments/1g1kq7/diablo_is_a_linktime_optimizer_for_obfuscation/Falset5_2qmd0FalseFalset3_1g1kq7http://diablo.elis.ugent.be/
1370420679.020gsbabil.github.io1fpl23AntiTaintDroid (a.k.a. ScrubDroid) source code releasednick_name2552http://www.reddit.com/r/ReverseEngineering/comments/1fpl23/antitaintdroid_aka_scrubdroid_source_code_released/Falset5_2qmd0FalseFalset3_1fpl23http://gsbabil.github.io/AntiTaintDroid/
1368699221.018nosuchcon.org1efyf7NoSuchCon 2013 talksigor_sk2240http://www.reddit.com/r/ReverseEngineering/comments/1efyf7/nosuchcon_2013_talks/Falset5_2qmd0FalseFalset3_1efyf7http://www.nosuchcon.org/talks/
1367886413.018syscan.org1dtv54Revisiting Mac OS X Kernel Rootkits [PDF.ZIP]rolfr24611http://www.reddit.com/r/ReverseEngineering/comments/1dtv54/revisiting_mac_os_x_kernel_rootkits_pdfzip/Falset5_2qmd0FalseFalset3_1dtv54http://syscan.org/index.php/download/get/9331ff8a03a7a472e8a3b46e63e9aa26/SyScan2013_DAY2_SPEAKER10_Pedro_Vilaca_Revisiting_Mac_OSX_Kernel_Rootkits.zip
1364455242.017github.com1b5zbtan ANTLR grammar to parse x86 assembler instructionssimpleuser25812http://www.reddit.com/r/ReverseEngineering/comments/1b5zbt/an_antlr_grammar_to_parse_x86_assembler/Falset5_2qmd0FalseFalset3_1b5zbthttps://github.com/sporst/Reverse-Engineering-Scripts/tree/master/antlr_x86
1364412023.018blog.nektra.com1b4m15IDA Pro plugin for identifying functions on C++ and COM objects virtual tablessrw2578http://www.reddit.com/r/ReverseEngineering/comments/1b4m15/ida_pro_plugin_for_identifying_functions_on_c_and/Falset5_2qmd0FalseFalset3_1b4m15http://blog.nektra.com/main/2013/03/27/how-to-identify-virtual-table-functions-with-the-vtbl-ida-pro-plugin/
1362660400.019hex-rays.com19ubu2IDA: What's new in 6.4.130306simpleuser27819http://www.reddit.com/r/ReverseEngineering/comments/19ubu2/ida_whats_new_in_64130306/Falset5_2qmd0FalseFalset3_19ubu2https://www.hex-rays.com/products/ida/6.4/index.shtml
1362157365.019self.ReverseEngineering19gye4The source code of DroidScope has been released.hengyin2340http://www.reddit.com/r/ReverseEngineering/comments/19gye4/the_source_code_of_droidscope_has_been_released/If you read the paper 'DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis' published in USENIX Security and like to use it, it is available now:https://code.google.com/p/decaf-platform/Falset5_2qmd0FalseTruet3_19gye4http://www.reddit.com/r/ReverseEngineering/comments/19gye4/the_source_code_of_droidscope_has_been_released/
1361820975.019blog.nektra.com197ievInjecting a DLL in a Modern UI Metro Applicationsrw30110http://www.reddit.com/r/ReverseEngineering/comments/197iev/injecting_a_dll_in_a_modern_ui_metro_application/Falset5_2qmd0FalseFalset3_197ievhttp://blog.nektra.com/main/2013/02/25/injecting-a-dll-in-modernui-metro-app-win8/
1360622130.017rareconference.org18c4uvNew industry & academic conference, Recent Advances in Reverse Engineering (R.A.R.E.), call for papers announcedrolfr2252http://www.reddit.com/r/ReverseEngineering/comments/18c4uv/new_industry_academic_conference_recent_advances/Falset5_2qmd0FalseFalset3_18c4uvhttp://rareconference.org/
1359648436.018cerc.wvu.edu17mucdHidden Markov Models To Detect Metamorphic Malware by Venkatachalam and Stamp [PDF]turnersr2570http://www.reddit.com/r/ReverseEngineering/comments/17mucd/hidden_markov_models_to_detect_metamorphic/Falset5_2qmd0FalseFalset3_17mucdhttp://cerc.wvu.edu/download/WORLDCOMP%2711/2011%20CD%20papers/SAM4877.pdf
1359444397.019waleedassar.blogspot.com17hhptWow64-Specific Anti-Debug Trickwaliedassar2670http://www.reddit.com/r/ReverseEngineering/comments/17hhpt/wow64specific_antidebug_trick/Falset5_2qmd0FalseFalset3_17hhpthttp://waleedassar.blogspot.com/2013/01/wow64-specific-anti-debug-trick.html
1357638010.016self.ReverseEngineering166cywAn Analysis of the PlugX RATllkc2044http://www.reddit.com/r/ReverseEngineering/comments/166cyw/an_analysis_of_the_plugx_rat/In this blog post, we deliver an analysis of PlugX, a Remote Access Trojan which has seen increasing use in recent targeted attacks. We offer new insights into the development and deployment of this RAT, describe the functionality of its plugins, detail several interesting mechanisms which it employs to evade antivirus software and User Access Controls, and explain how to decode on-disk artifacts or C&C traffic of PlugX.http://lastline.com/blog.phpFalset5_2qmd0FalseTruet3_166cywhttp://www.reddit.com/r/ReverseEngineering/comments/166cyw/an_analysis_of_the_plugx_rat/
1357585340.018springer.com164t97Software Similarity and Classification [Book]samcrem2466http://www.reddit.com/r/ReverseEngineering/comments/164t97/software_similarity_and_classification_book/Falset5_2qmd0FalseFalset3_164t97http://www.springer.com/computer/security+and+cryptology/book/978-1-4471-2908-0
1354955501.017waleedassar.blogspot.com14hp9hWindows Internals: SkipThreadAttachwaliedassar2250http://www.reddit.com/r/ReverseEngineering/comments/14hp9h/windows_internals_skipthreadattach/Falset5_2qmd0FalseFalset3_14hp9hhttp://www.waleedassar.blogspot.com/2012/12/skipthreadattach.html
1354343967.016rise4fun.com143ekuZ3Py - guideerseal2150http://www.reddit.com/r/ReverseEngineering/comments/143eku/z3py_guide/Falset5_2qmd0FalseFalset3_143ekuhttp://rise4fun.com/z3py/tutorial
1353235924.018self.ReverseEngineering13e7zmWhy do my strings look like strings and not like strings?AaronOpfer2794http://www.reddit.com/r/ReverseEngineering/comments/13e7zm/why_do_my_strings_look_like_strings_and_not_like/So I'm debugging this application that has chat functionality. I set a conditional logging breakpoint on the function I believe is responsible for printing the chat text on the screen. I noticed some extraordinarily strange behavior regarding its parameters.Sometimes, when the username or message of the speaker are short strings, pointers to the strings themselves are passed to the function. So the stack appears to be something like RETN to Address UNICODE 'User' UNICODE 'Test' ..So far so good. Except that I noticed that sometimes I didn't get this parameter format. Other times it looks like this.. RETN to address 0xAABBCCDD ; pointer to some memory structure 0xEEFFGGHH ; pointer to some other memory structureYeah, just some totally arbitrary pointers. Except that I investigated more closely, and following those pointers gives me a structure that's about 0x30 bytes in size (IIRC), the first four bytes of which is typically a pointer to the unicode string, or just some garbage bytes. About +0x24 into the structure is a DWORD that has the string length, and zero is a valid value for it (which is why that pointer can have garbage in it I guess). I am pretty certain that this structure is a C++ STL string (it's using the MSVR100 runtime). So here's the question:Why does this function receive C-style strings when the strings are <8 characters long, and otherwise receive pointers to structures that represent strings (probably STL)?Is this an optimization in the MS runtime? I guess a 7 character + one null character string would take up exactly 16 bytes, and anything longer than that seems to be shoved into this weird string structure. Maybe it reallocates things from heap memory into larger pages after a certain size? It's confusing because I don't understand how the code can tell when it has received one parameter type over the other.Falset5_2qmd0FalseTruet3_13e7zmhttp://www.reddit.com/r/ReverseEngineering/comments/13e7zm/why_do_my_strings_look_like_strings_and_not_like/
1351630910.018self.ReverseEngineering12cxrwFuzzing/Reversing an API for a PCI Card21310http://www.reddit.com/r/ReverseEngineering/comments/12cxrw/fuzzingreversing_an_api_for_a_pci_card/I recently inherited an older PCI card from a company that no longer exists. The card is designed to do high frequency cryptoprocessing and I thought it would be fun to tinker around with it and make some C apps using its API. Unfortunately, the API is not readily available and the company isn't around to provide it. What are some tools I should look at using for trying to fuzz out commands from it? It's a PCI card that also has a serial interface for the API. Falset5_2qmd0FalseTruet3_12cxrwhttp://www.reddit.com/r/ReverseEngineering/comments/12cxrw/fuzzingreversing_an_api_for_a_pci_card/
1351564407.018trone.di.fc.ul.pt12beudBinary code obfuscation through C++ template metaprogramming [PDF]rolfr2131http://www.reddit.com/r/ReverseEngineering/comments/12beud/binary_code_obfuscation_through_c_template/Falset5_2qmd0FalseFalset3_12beudhttp://trone.di.fc.ul.pt/images/2/22/Obfuscation.pdf
1351529428.019blog.trailofbits.com12a6xmEnding the Love Affair with ExploitShield – Trail of Bitsdguido2230http://www.reddit.com/r/ReverseEngineering/comments/12a6xm/ending_the_love_affair_with_exploitshield_trail/Falset5_2qmd0FalseFalset3_12a6xmhttp://blog.trailofbits.com/2012/10/29/ending-the-love-affair-with-exploitshield/
1350821373.018github.com11uaerPicture authentication in Canon DSLR (Original Decision Data): the next step after Elcomsoft presentation, some code and pictures samples to play with it. lclevy2570http://www.reddit.com/r/ReverseEngineering/comments/11uaer/picture_authentication_in_canon_dslr_original/Falset5_2qmd0FalseFalset3_11uaerhttps://github.com/lclevy/odd_verify
1348259150.018hex-rays.com109l2wResults of Hex-Rays' Plugin Contest for 2012rolfr2020http://www.reddit.com/r/ReverseEngineering/comments/109l2w/results_of_hexrays_plugin_contest_for_2012/Falset5_2qmd0FalseFalset3_109l2whttp://hex-rays.com/contests/2012/index.shtml
1346617328.019self.ReverseEngineeringz8tdcWhat hardware is needed for ROM dumping?heapface32136http://www.reddit.com/r/ReverseEngineering/comments/z8tdc/what_hardware_is_needed_for_rom_dumping/I recently got into re-making old classic GBA games in C using either SDL or Allegro, and using some sprites I found online. However, I wanted to know HOW these sprites actually get extracted and how to reverse engineer a ROM.I have been searching for a few hours on some hardware to acutally **dump** my ROM (GBA) and have only come upon software.. which is no help since I don't have it dumped onto my PC yet.-- The only thing I found was [this](http://www.gameboy-advance.net/flash_card/game_bank.htm) but I don't know if that is what I am looking for.So, I decided to come here, and see if any of you clever people knew what kind of hardware I would need to dump a ROM (or to help me out), export it to my computer, and have fun with it.Any help appreciated.ThanksFalset5_2qmd0FalseTruet3_z8tdchttp://www.reddit.com/r/ReverseEngineering/comments/z8tdc/what_hardware_is_needed_for_rom_dumping/
1344527831.018pferrie.host22.comxxzygmaximum possible code execution in the PE headerpeterferrie2134http://www.reddit.com/r/ReverseEngineering/comments/xxzyg/maximum_possible_code_execution_in_the_pe_header/Falset5_2qmd0FalseFalset3_xxzyghttp://pferrie.host22.com/misc/pehdr.htm
1342930840.019openrce.orgwyd75Pedram is soliciting comments regarding the future of OpenRCErolfr24516http://www.reddit.com/r/ReverseEngineering/comments/wyd75/pedram_is_soliciting_comments_regarding_the/Falset5_2qmd0FalseFalset3_wyd75http://www.openrce.org/forums/posts/2082
1341798172.019opensecuritytraining.infow8xjdDay 2 Intro RE videos postedOpenSecurityTraining2120http://www.reddit.com/r/ReverseEngineering/comments/w8xjd/day_2_intro_re_videos_posted/Falset5_2qmd0FalseFalset3_w8xjdhttp://www.opensecuritytraining.info/ChangeBlog/Entries/2012/7/8_Videos_for_day_2_of_Introduction_to_Reverse_Engineering_Software_released!.html
1341612772.019github.comw5fwrfurnace-avm2: ActionScript3 VM static analysis library, decompiler and deobfuscator.postmodern1900http://www.reddit.com/r/ReverseEngineering/comments/w5fwr/furnaceavm2_actionscript3_vm_static_analysis/Falset5_2qmd0FalseFalset3_w5fwrhttps://github.com/whitequark/furnace-avm2
1340318072.018thelegendofrandom.comvelt2Modifying Binaries: Adding a Menu Item To An Existing BinaryRandomNetzley32143http://www.reddit.com/r/ReverseEngineering/comments/velt2/modifying_binaries_adding_a_menu_item_to_an/Falset5_2qmd0FalseFalset3_velt2http://thelegendofrandom.com/blog/archives/759
1336180054.016self.ReverseEngineeringt7qsaHelp needed for a beginner. ptremblay87261022http://www.reddit.com/r/ReverseEngineering/comments/t7qsa/help_needed_for_a_beginner/Hi ! I'm new to reverse engineering and I reversed the game Solitaire on Windows 7 with IDA Pro 5.2. I have some questions for you guys : 1) How can I break on any key pressed event ? I tryed to break on every GetKeyState() and it don't break. I also tryed TranslateMessage() but the only one that break does it every time in a loop. There is no GetAsyncKeyState(). 2) Is there any way to set a breakpoint on every occurence of a function call like in Ollydbg ? I can't manage to find a way in IDA Pro. 3) Is there any good online tutorial that I can read to learn more about Reverse Engineering ? I found http://www.codebreakers-journal.com/ and I want to know if you guys know others tutorials like this. Falset5_2qmd0FalseTruet3_t7qsahttp://www.reddit.com/r/ReverseEngineering/comments/t7qsa/help_needed_for_a_beginner/
1335147879.018os2museum.comsnj93Solaris 2.5.1 and 2.6 crashes on modern Intel CPUsyuhong2130http://www.reddit.com/r/ReverseEngineering/comments/snj93/solaris_251_and_26_crashes_on_modern_intel_cpus/Falset5_2qmd0FalseFalset3_snj93http://www.os2museum.com/wp/?p=1112
1333047482.019waleedassar.blogspot.comrjn79OllyDbg Resource Table Parsing Integer Overflowwaliedassar2340http://www.reddit.com/r/ReverseEngineering/comments/rjn79/ollydbg_resource_table_parsing_integer_overflow/Falset5_2qmd0FalseFalset3_rjn79http://waleedassar.blogspot.com/2012/03/ollydbg-resource-table-parsing-integer.html
1330479702.018hackingbtbusinesshub.wordpress.comqalldDiscovering JTAG pinoutsigor_sk2240http://www.reddit.com/r/ReverseEngineering/comments/qalld/discovering_jtag_pinouts/Falset5_2qmd0FalseFalset3_qalldhttp://hackingbtbusinesshub.wordpress.com/2012/01/26/discovering-jtag-pinouts/
1325776346.018daemon-enterprises.como4084Reverse Engineering Wargamepwnwaffe2689http://www.reddit.com/r/ReverseEngineering/comments/o4084/reverse_engineering_wargame/Falset5_2qmd0FalseFalset3_o4084http://www.daemon-enterprises.com/chapter0x01.html
1323370709.017syprog.blogspot.comn55ixHow to hide injected DLL in Windowspraddo2361http://www.reddit.com/r/ReverseEngineering/comments/n55ix/how_to_hide_injected_dll_in_windows/Falset5_2qmd0FalseFalset3_n55ixhttp://syprog.blogspot.com/2011/12/hiding-injected-dll-in-windows.html
1323166742.016invisiblethingslab.comn2dgjAttacking Intel TXT® via SINIT code execution hijackinggannimo2372http://www.reddit.com/r/ReverseEngineering/comments/n2dgj/attacking_intel_txt_via_sinit_code_execution/Falset5_2qmd0FalseFalset3_n2dgjhttp://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf
1320756913.018codersnotes.comm4qsgSleepy - Code Profiling softwaredigduggg2460http://www.reddit.com/r/ReverseEngineering/comments/m4qsg/sleepy_code_profiling_software/Falset5_2qmd0FalseFalset3_m4qsghttp://www.codersnotes.com/sleepy
1320418267.017canyoucrackit.co.ukm0bj5Can you crack it?n3zumi21418http://www.reddit.com/r/ReverseEngineering/comments/m0bj5/can_you_crack_it/Falset5_2qmd0FalseFalset3_m0bj5http://www.canyoucrackit.co.uk/
1320342446.018self.ReverseEngineeringlz7tjAnalyzing an executable fileNotSoNoveltyAccount26815http://www.reddit.com/r/ReverseEngineering/comments/lz7tj/analyzing_an_executable_file/I have an executable file here and I want to figure out some information about it such as the compiler used, resources, etc. I know there's a number of programs out there which can do this, but for some reason they've slipped my mind.I really need to know what language this executable is written in, and I know there's tools to do this and much more, but what are they?Falset5_2qmd0FalseTruet3_lz7tjhttp://www.reddit.com/r/ReverseEngineering/comments/lz7tj/analyzing_an_executable_file/
1318275097.016hexblog.coml7e4sNew features in Hex-Rays Decompiler 1.6igor_sk2040http://www.reddit.com/r/ReverseEngineering/comments/l7e4s/new_features_in_hexrays_decompiler_16/Falset5_2qmd0FalseFalset3_l7e4shttp://www.hexblog.com/?p=544
1315586901.017newsoft-tech.blogspot.comka6yyD-Link DCS-2121 and the state of embedded securityigor_sk2032http://www.reddit.com/r/ReverseEngineering/comments/ka6yy/dlink_dcs2121_and_the_state_of_embedded_security/Falset5_2qmd0FalseFalset3_ka6yyhttp://newsoft-tech.blogspot.com/2010/09/d-link-dcs-2121-and-state-of-embedded.html
1313369259.017computer-forensics.sans.orgjivn8Malware Analysis Challenge to Strengthen Your Skills5d41402abc4b2a76b9712253http://www.reddit.com/r/ReverseEngineering/comments/jivn8/malware_analysis_challenge_to_strengthen_your/Falset5_2qmd0FalseFalset3_jivn8http://computer-forensics.sans.org/blog/2011/08/10/malware-analysis-challenge-to-strengthen-your-skills
1309247399.018reverse.put.asib4bwGDB init (with colored registers) for Macwishi2132http://www.reddit.com/r/ReverseEngineering/comments/ib4bw/gdb_init_with_colored_registers_for_mac/Falset5_2qmd0FalseFalset3_ib4bwhttp://reverse.put.as/2011/06/20/gdb-init-v7-4/
1300315144.019pastebin.comg5gwrTDL3, Faizan Haider, Fahim Shamshad, Mohammad Faheem, Raymond Davis2129http://www.reddit.com/r/ReverseEngineering/comments/g5gwr/tdl3_faizan_haider_fahim_shamshad_mohammad_faheem/Falset5_2qmd0FalseFalset3_g5gwrhttp://pastebin.com/UpvGUw19
1300276482.016forsyte.deg52wvStatic Analysis of x86 Executables (Doctoral Dissertation, September 2010) [PDF]samcrem1933http://www.reddit.com/r/ReverseEngineering/comments/g52wv/static_analysis_of_x86_executables_doctoral/Falset5_2qmd0FalseFalset3_g52wvhttp://www.forsyte.de/~kinder/download.php?t=1&k=thesis
1293851485.019self.ReverseEngineeringeuez9How can I get an entry job in reverse engineering or computer security in the Bay Area, and how much would I earn?moving2bayarea22320http://www.reddit.com/r/ReverseEngineering/comments/euez9/how_can_i_get_an_entry_job_in_reverse_engineering/Falset5_2qmd0FalseTruet3_euez9http://www.reddit.com/r/ReverseEngineering/comments/euez9/how_can_i_get_an_entry_job_in_reverse_engineering/
1292832856.018kickstarter.comeoo6zLast chance to fund OpenVizslarolfr1916http://www.reddit.com/r/ReverseEngineering/comments/eoo6z/last_chance_to_fund_openvizsla/Falset5_2qmd0FalseFalset3_eoo6zhttp://www.kickstarter.com/projects/bushing/openvizsla-open-source-usb-protocol-analyzer?last-chance
1291838044.018blogs.technet.comeigz2On the effectiveness of DEP and ASLR [MS Blog]2020http://www.reddit.com/r/ReverseEngineering/comments/eigz2/on_the_effectiveness_of_dep_and_aslr_ms_blog/Falset5_2qmd0FalseFalset3_eigz2http://blogs.technet.com/b/srd/archive/2010/12/08/on-the-effectiveness-of-dep-and-aslr.aspx
1290017602.019self.ReverseEngineeringe7mn6Any beginners intreseted in group study or collective learning?NinjaYoda26712http://www.reddit.com/r/ReverseEngineering/comments/e7mn6/any_beginners_intreseted_in_group_study_or/I am really interested in Reverse Engineering. I got myself [Reversing: The secrets of Reverse Engineering book](http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817) and finished the first chapter. Its seems really promising albeit challenging. Is there some one who has just started or wants to start but don't wanna row the boat all by yourself? Working in groups always makes you learn more by answering questions or clearing your doubts. It makes you go an extra mile sometimes and there is always the fun part or knowing some one going through the same pain. We can share interesting challenges, articles or whatever we can find. Help fellow friends stay motivated and focused. **Also, advance reversers are always welcome to pitch in and contribute as they feel.**Falset5_2qmd0FalseTruet3_e7mn6http://www.reddit.com/r/ReverseEngineering/comments/e7mn6/any_beginners_intreseted_in_group_study_or/
1289972710.020self.ReverseEngineeringe7dmfRevEng: What are you working on right now?Cm7b521118http://www.reddit.com/r/ReverseEngineering/comments/e7dmf/reveng_what_are_you_working_on_right_now/What are you working on right now? Be specific if you can, obscure if you can't.I'm reversing the firmware of an RTU in a SCADA system. It's m68k-based. I had to break out some old-school m68k documentation.Falset5_2qmd0FalseTruet3_e7dmfhttp://www.reddit.com/r/ReverseEngineering/comments/e7dmf/reveng_what_are_you_working_on_right_now/
1289346637.018lists.grok.org.uke3qonKernel 0-day - read the uninitialized bytes of the kernel stackbigmac1915http://www.reddit.com/r/ReverseEngineering/comments/e3qon/kernel_0day_read_the_uninitialized_bytes_of_the/Falset5_2qmd0FalseFalset3_e3qonhttp://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html
1288974495.017exploit-db.come1qznDTrace - Applied Reverse Engineering on OSX [PDF]2030http://www.reddit.com/r/ReverseEngineering/comments/e1qzn/dtrace_applied_reverse_engineering_on_osx_pdf/Falset5_2qmd0FalseFalset3_e1qznhttp://www.exploit-db.com/download_pdf/15364
1288201228.018blog.ksplice.comdx9whHosting backdoors in hardware2350http://www.reddit.com/r/ReverseEngineering/comments/dx9wh/hosting_backdoors_in_hardware/Falset5_2qmd0FalseFalset3_dx9whhttp://blog.ksplice.com/2010/10/hosting-backdoors-in-hardware/
1283870379.019self.ReverseEngineeringdamouAnyone knows of good universities where one can do a master's degree on reverse engineering, vulnerability research and static/dynamic code analysis?gbr01012459http://www.reddit.com/r/ReverseEngineering/comments/damou/anyone_knows_of_good_universities_where_one_can/Anyone knows of good universities where one can do a master's degree on reverse engineering, vulnerability research and static/dynamic code analysis?Here follows the ones I know, with its respective research groups:- University of California - Berkeley (BitBlaze and WebBlaze groups)- University of California - Santa Barbara (Return-oriented programming, etc)- CMU - CyLab- Stanford University (Danwson Engler et al)- Loria - France (http://lhs.loria.fr/)Thanks.Falset5_2qmd0FalseTruet3_damouhttp://www.reddit.com/r/ReverseEngineering/comments/damou/anyone_knows_of_good_universities_where_one_can/
1280784260.019rcecafe.netcwkg5IDAQ: The result of 7 months at Hex-Rayscloudburst2010http://www.reddit.com/r/ReverseEngineering/comments/cwkg5/idaq_the_result_of_7_months_at_hexrays/Falset5_2qmd0FalseFalset3_cwkg5http://rcecafe.net/?p=151
1280451754.017securityevaluators.comcvaruCrash Analysis with BitBlaze [PDF, Whitepaper]rolfr1813http://www.reddit.com/r/ReverseEngineering/comments/cvaru/crash_analysis_with_bitblaze_pdf_whitepaper/Falset5_2qmd0FalseFalset3_cvaruhttp://securityevaluators.com/files/papers/CrashAnalysis.pdf
1279370150.017progamercity.netcqmd7Game Hacking for beginner with Video and Source Code. Will be suitable for beginners.Gamerr2470http://www.reddit.com/r/ReverseEngineering/comments/cqmd7/game_hacking_for_beginner_with_video_and_source/Falset5_2qmd0FalseFalset3_cqmd7http://www.progamercity.net/ghack-tut/game-hacking-for-beginner-video-source-code-t202.html
1279037014.019blog.zynamics.comcp3b3How to really obfuscate your PDF malwarerolfr2010http://www.reddit.com/r/ReverseEngineering/comments/cp3b3/how_to_really_obfuscate_your_pdf_malware/Falset5_2qmd0FalseFalset3_cp3b3http://blog.zynamics.com/2010/07/13/recon-slides-how-to-really-obfuscate-your-pdf-malware/
1278888591.019romhacking.netcoffnRomhacking.net - Documents2011http://www.reddit.com/r/ReverseEngineering/comments/coffn/romhackingnet_documents/Falset5_2qmd0FalseFalset3_coffnhttp://www.romhacking.net/docs/
1269984485.019bit.lybkdjyAn analysis of fuzzing 4 products with 5 lines of Python (Charlie Miller's CSW presentation)[PPT]jsco2345http://www.reddit.com/r/ReverseEngineering/comments/bkdjy/an_analysis_of_fuzzing_4_products_with_5_lines_of/Falset5_2qmd0FalseFalset3_bkdjyhttp://bit.ly/dt3dkb
1267126641.018newsoft-tech.blogspot.comb6iaxBlog post on discovering MS10-009 via diffing and triggering it with scapyrolfr1911http://www.reddit.com/r/ReverseEngineering/comments/b6iax/blog_post_on_discovering_ms10009_via_diffing_and/Falset5_2qmd0FalseFalset3_b6iaxhttp://newsoft-tech.blogspot.com/2010/02/ms10-009.html
1266366421.016feliam.wordpress.comb2wojFilling Adobe's heapwishi1820http://www.reddit.com/r/ReverseEngineering/comments/b2woj/filling_adobes_heap/Falset5_2qmd0FalseFalset3_b2wojhttp://feliam.wordpress.com/2010/02/15/filling-adobes-heap/
1261081053.017hex-rays.comafv5eIDA 5.6 beta available; this is the feature listrolfr1922http://www.reddit.com/r/ReverseEngineering/comments/afv5e/ida_56_beta_available_this_is_the_feature_list/Falset5_2qmd0FalseFalset3_afv5ehttp://www.hex-rays.com/idapro/56/index.htm
1249852352.017security.dico.unimi.it99129Testing CPU Emulatorsphn1x2031http://www.reddit.com/r/ReverseEngineering/comments/99129/testing_cpu_emulators/Falset5_2qmd0FalseFalset3_99129http://security.dico.unimi.it/~lorenzo/EmuFuzzer.pdf
1248904008.017blackhat.com95sd5Black Hat USA 2009 Papers & Slidescloudburst2031http://www.reddit.com/r/ReverseEngineering/comments/95sd5/black_hat_usa_2009_papers_slides/Falset5_2qmd0FalseFalset3_95sd5http://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html
1222724116.017blackhat.com749qoReturn-Oriented Programming [PDF]rolfr2035http://www.reddit.com/r/ReverseEngineering/comments/749qo/returnoriented_programming_pdf/Falset5_2qmd0FalseFalset3_749qohttp://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return_Oriented_Programming.pdf
1372352451.016slideshare.net1h6stcReversing and Auditing Android's Proprietary Bitsjduck13372044http://www.reddit.com/r/ReverseEngineering/comments/1h6stc/reversing_and_auditing_androids_proprietary_bits/Falset5_2qmd0FalseFalset3_1h6stchttp://www.slideshare.net/joshjdrake/reversing-and-auditing-androids-proprietary-bits
1372036108.017github.com1gxuo5Python bindings for the Hexrays Decompilerturnersr2030http://www.reddit.com/r/ReverseEngineering/comments/1gxuo5/python_bindings_for_the_hexrays_decompiler/Falset5_2qmd0FalseFalset3_1gxuo5https://github.com/EiNSTeiN-/hexrays-python
1371732987.019cs.arizona.edu1gq2vsStack Analysis of x86 Executables [PDF]perror2780http://www.reddit.com/r/ReverseEngineering/comments/1gq2vs/stack_analysis_of_x86_executables_pdf/Falset5_2qmd0FalseFalset3_1gq2vshttp://www.cs.arizona.edu/~debray/Publications/stack-analysis.pdf
1371564527.018github.com1gl24nFuzzBALL binary symbolic execution tool was open sourcedgalapag02131http://www.reddit.com/r/ReverseEngineering/comments/1gl24n/fuzzball_binary_symbolic_execution_tool_was_open/Falset5_2qmd0FalseFalset3_1gl24nhttps://github.com/bitblaze-fuzzball/fuzzball
1371337673.018self.ReverseEngineering1gfabkSkype binaryhuyvun31137http://www.reddit.com/r/ReverseEngineering/comments/1gfabk/skype_binary/Skype's anti-reverse engineering technology is very strong - do you know if they built their own code, or use an existing libary .Falset5_2qmd0FalseTruet3_1gfabkhttp://www.reddit.com/r/ReverseEngineering/comments/1gfabk/skype_binary/
1370848931.016shell-storm.org1g170kConcolic execution - Taint analysis with Valgrind and constraints path solver with Z3jonathansalwan2487http://www.reddit.com/r/ReverseEngineering/comments/1g170k/concolic_execution_taint_analysis_with_valgrind/Falset5_2qmd0FalseFalset3_1g170khttp://shell-storm.org/blog/Concolic-execution-taint-analysis-with-valgrind-and-constraints-path-solver-with-z3/
1370820479.016trapbit.com1g0dfrDion Blazakis' half of the ASLR/timing attacks speech at SummerCon 2013 [PDF]rolfr1930http://www.reddit.com/r/ReverseEngineering/comments/1g0dfr/dion_blazakis_half_of_the_aslrtiming_attacks/Falset5_2qmd0FalseFalset3_1g0dfrhttp://www.trapbit.com/talks/Summerc0n2013-GCWoah.pdf
1369949227.016jmlr.org1fd2p2Sally: A Tool for Embedding Strings in Vector Spaceslaks3162263http://www.reddit.com/r/ReverseEngineering/comments/1fd2p2/sally_a_tool_for_embedding_strings_in_vector/Falset5_2qmd0FalseFalset3_1fd2p2http://jmlr.org/papers/volume13/rieck12a/rieck12a.pdf
1366860060.016bitbucket.org1d258yAxel Simon's research group published the beginnings of an x86 static binary program analysis frameworkrolfr2262http://www.reddit.com/r/ReverseEngineering/comments/1d258y/axel_simons_research_group_published_the/Falset5_2qmd0FalseFalset3_1d258yhttps://bitbucket.org/simona/mltk
1366298321.015novainfosec.com1clymvNoriben – Your Personal, Portable Malware Sandboxgrecs1832http://www.reddit.com/r/ReverseEngineering/comments/1clymv/noriben_your_personal_portable_malware_sandbox/Falset5_2qmd0FalseFalset3_1clymvhttps://www.novainfosec.com/2013/04/17/noriben-your-personal-portable-malware-sandbox/
1365577406.016phracker.github.io1c1sl4Made a GitHub repo for Hopper Disassembler scripts. For anyone doing binary analysis on OS X these sure come in handy.phracker2372http://www.reddit.com/r/ReverseEngineering/comments/1c1sl4/made_a_github_repo_for_hopper_disassembler/Falset5_2qmd0FalseFalset3_1c1sl4http://phracker.github.io/HopperScripts/
1363822817.019engr.uconn.edu1ap4lwIntel SIMD architecture [PDF, slides]rolfr2340http://www.reddit.com/r/ReverseEngineering/comments/1ap4lw/intel_simd_architecture_pdf_slides/Falset5_2qmd0FalseFalset3_1ap4lwhttp://www.engr.uconn.edu/~zshi/course/cse5095/topic1_isa_intel_simd.pdf
1361977377.016devttys0.com19bv54Binwalk v1.0 now has Python supportjwcrux2375http://www.reddit.com/r/ReverseEngineering/comments/19bv54/binwalk_v10_now_has_python_support/Falset5_2qmd0FalseFalset3_19bv54http://www.devttys0.com/2013/02/binwalk-v1-0-now-with-python/
1358469563.019waleedassar.blogspot.com16sb5qA Real Random VirtualAllocwaliedassar2670http://www.reddit.com/r/ReverseEngineering/comments/16sb5q/a_real_random_virtualalloc/Falset5_2qmd0FalseFalset3_16sb5qhttp://waleedassar.blogspot.com/2013/01/a-real-random-virtualalloc.html
1356062850.017spth.virii.lu157ivlValhalla VX Zine Issue #3rolfr2250http://www.reddit.com/r/ReverseEngineering/comments/157ivl/valhalla_vx_zine_issue_3/Falset5_2qmd0FalseFalset3_157ivlhttp://spth.virii.lu/main.htm
1354835929.017llvm.org14etic2012 LLVM Developers' Meeting Presentations Slides and VideoHockeyInJune2030http://www.reddit.com/r/ReverseEngineering/comments/14etic/2012_llvm_developers_meeting_presentations_slides/Falset5_2qmd0FalseFalset3_14etichttp://llvm.org/devmtg/2012-11/
1354224277.018self.ReverseEngineering140jhdTools for file entropy and analysis?jerzmacow24613http://www.reddit.com/r/ReverseEngineering/comments/140jhd/tools_for_file_entropy_and_analysis/I was wondering if there are any well known tools that help with examining an arbitrary file to get clues as to what it actually is. Carving is really useful, but what if it's plaintext that's just bitshifted or a simple crypto algorithm? Are there any tools that analyze data for entropy and patterns?Falset5_2qmd0FalseTruet3_140jhdhttp://www.reddit.com/r/ReverseEngineering/comments/140jhd/tools_for_file_entropy_and_analysis/
1353795413.019waleedassar.blogspot.com13qcrqSuppressDebugMsg As Anti-Debug Trickwaliedassar2120http://www.reddit.com/r/ReverseEngineering/comments/13qcrq/suppressdebugmsg_as_antidebug_trick/Falset5_2qmd0FalseFalset3_13qcrqhttp://waleedassar.blogspot.com/2012/11/suppressdebugmsg-as-anti-debug-trick.html
1353307298.019f13-labs.net13fuekWindows Kernel Font Fuzzing and ExploitationN3mes1s2450http://www.reddit.com/r/ReverseEngineering/comments/13fuek/windows_kernel_font_fuzzing_and_exploitation/Falset5_2qmd0FalseFalset3_13fuekhttp://www.f13-labs.net/pacsec2012/PacSec2012_Lee_Chan.pdf
1352908201.018rcecafe.net136nw5MUI files under the hoodN3mes1s2021http://www.reddit.com/r/ReverseEngineering/comments/136nw5/mui_files_under_the_hood/Falset5_2qmd0FalseFalset3_136nw5http://rcecafe.net/?p=266
1351473908.018ensiwiki.ensimag.fr1290fk10 years later, which vulnerabilities still matter? [PDF, slides]rolfr2131http://www.reddit.com/r/ReverseEngineering/comments/1290fk/10_years_later_which_vulnerabilities_still_matter/Falset5_2qmd0FalseFalset3_1290fkhttp://ensiwiki.ensimag.fr/images/e/e8/GreHack-2012-talk-Kostya_Kortchinsky_Crypt0ad_-10_years_later_which_in_memory_vulnerabilities_still_matter.pdf
1350411592.018volatility-labs.blogspot.com11kylxReverse Engineering Poison Ivy's Injected Code Fragments transt2460http://www.reddit.com/r/ReverseEngineering/comments/11kylx/reverse_engineering_poison_ivys_injected_code/Falset5_2qmd0FalseFalset3_11kylxhttp://volatility-labs.blogspot.com/2012/10/reverse-engineering-poison-ivys.html
1348781988.017thelegendofrandom.com10l2h2Understanding TLS CallbacksRandomNetzley36191http://www.reddit.com/r/ReverseEngineering/comments/10l2h2/understanding_tls_callbacks/Falset5_2qmd0FalseFalset3_10l2h2http://thelegendofrandom.com/blog/archives/2418
1346978497.015thelegendofrandom.comzha9sCracking Visual Basic Binaries, Pt. 2RandomNetzley34193http://www.reddit.com/r/ReverseEngineering/comments/zha9s/cracking_visual_basic_binaries_pt_2/Falset5_2qmd0FalseFalset3_zha9shttp://thelegendofrandom.com/blog/archives/2044
1346357967.0170xlab.orgz3gh3Understanding the Dalvik Virtual Machinevirvdova1921http://www.reddit.com/r/ReverseEngineering/comments/z3gh3/understanding_the_dalvik_virtual_machine/Falset5_2qmd0FalseFalset3_z3gh3http://0xlab.org/~jserv/tmp/dalvik.pdf
1344898485.016gdtr.wordpress.comy64xuLeaking information using timing attacks on hash tables, part 2rolfr1930http://www.reddit.com/r/ReverseEngineering/comments/y64xu/leaking_information_using_timing_attacks_on_hash/Falset5_2qmd0FalseFalset3_y64xuhttp://gdtr.wordpress.com/2012/08/14/leaking-information-using-timing-attacks-on-hash-tables-part-2/
1344170148.017joxeankoret.comxpns7Simple Bug Finding Tools: Fugue (I)joxeankoret2144http://www.reddit.com/r/ReverseEngineering/comments/xpns7/simple_bug_finding_tools_fugue_i/Falset5_2qmd0FalseFalset3_xpns7http://joxeankoret.com/blog/2012/08/05/simple-bug-finding-tools-fugue-i/
1342657529.017inertiawar.comwsgi0Windows 8 and Safe Unlinking in NTDLLvirvdova2030http://www.reddit.com/r/ReverseEngineering/comments/wsgi0/windows_8_and_safe_unlinking_in_ntdll/Falset5_2qmd0FalseFalset3_wsgi0http://www.inertiawar.com/win8_unlink/
1340762516.015waleedassar.blogspot.comvnvo8CreateRemoteThread vs. RtlCreateUserThreadwaliedassar1940http://www.reddit.com/r/ReverseEngineering/comments/vnvo8/createremotethread_vs_rtlcreateuserthread/Falset5_2qmd0FalseFalset3_vnvo8http://waleedassar.blogspot.com/2012/06/createremotethread-vs.html
1340679242.018pwnies.comvlxqyPwnie Awards 2012 nominations open; submit your favorite stuffrolfr2020http://www.reddit.com/r/ReverseEngineering/comments/vlxqy/pwnie_awards_2012_nominations_open_submit_your/Falset5_2qmd0FalseFalset3_vlxqyhttp://pwnies.com/?year=2012
1340340688.017bbvforums.orgvf766Electronic voting machine reversingsergio_rivaldi2253http://www.reddit.com/r/ReverseEngineering/comments/vf766/electronic_voting_machine_reversing/Falset5_2qmd0FalseFalset3_vf766http://www.bbvforums.org/forums/messages/7659/82111.html
1338242228.017bbc.comu9b8xFlame: Massive cyber-attack discovered, researchers saynewgre2363http://www.reddit.com/r/ReverseEngineering/comments/u9b8x/flame_massive_cyberattack_discovered_researchers/Falset5_2qmd0FalseFalset3_u9b8xhttp://www.bbc.com/news/technology-18238326
1338030188.017cl.cam.ac.uku5usgFormal verication of machine-code programs [PDF, Ph.D. thesis]rolfr2142http://www.reddit.com/r/ReverseEngineering/comments/u5usg/formal_veri_cation_of_machinecode_programs_pdf/Falset5_2qmd0FalseFalset3_u5usghttp://www.cl.cam.ac.uk/~mom22/thesis.pdf
1337663037.019self.ReverseEngineeringtyt0kAdministrivia: if you're going to report something, send moderator mail describing why you did itrolfr2452http://www.reddit.com/r/ReverseEngineering/comments/tyt0k/administrivia_if_youre_going_to_report_something/Many comments and submissions that are innocuous end up getting reported to the moderators. For example, [this comment](http://www.reddit.com/r/ReverseEngineering/comments/tsavj/so_you_like_reversing_and_know_stuff_about/c4pfv9w) and [this submission](http://www.reddit.com/r/ReverseEngineering/comments/tqclq/intercepting_system_calls_on_x86_64_windows/). Reddit provides no facilities for determining who reported it or why they did so. Help us help you: if you feel like it doesn't belong for some reason (beyond personally disliking it), send moderator mail after reporting it.Falset5_2qmd0FalseTruet3_tyt0khttp://www.reddit.com/r/ReverseEngineering/comments/tyt0k/administrivia_if_youre_going_to_report_something/moderator
1335833025.017secondlookforensics.comt0prbLinux Memory Images (with kbeast rootkit)andrewtappert1812http://www.reddit.com/r/ReverseEngineering/comments/t0prb/linux_memory_images_with_kbeast_rootkit/Falset5_2qmd0FalseFalset3_t0prbhttp://secondlookforensics.com/images.html
1334097022.016waleedassar.blogspot.coms3avrOllyDbg NumberOfSections Crashwaliedassar2150http://www.reddit.com/r/ReverseEngineering/comments/s3avr/ollydbg_numberofsections_crash/Falset5_2qmd0FalseFalset3_s3avrhttp://waleedassar.blogspot.com/2012/04/ollydbg-numberofsections-crash.html
1332402378.019cc.gatech.edur83tjStatic detection of C++ vtable escape vulnerabilities in binary code [PDF]igor_sk2456http://www.reddit.com/r/ReverseEngineering/comments/r83tj/static_detection_of_c_vtable_escape/Falset5_2qmd0FalseFalset3_r83tjhttp://www.cc.gatech.edu/~giffin/papers/ndss12/DG12.pdf
1330548931.015infosecsouthwest.comqbu1mInfosec Southwest,'information security and hacking conference held in Austin, Texas', march 30 - april 1, registration opencrymsen2050http://www.reddit.com/r/ReverseEngineering/comments/qbu1m/infosec_southwest_information_security_and/Falset5_2qmd0FalseFalset3_qbu1mhttp://www.infosecsouthwest.com/
1329165756.015infoscience.epfl.chpny8rReverse Engineering of Binary Device Drivers with RevNIC [PDF]roflmaoff2273http://www.reddit.com/r/ReverseEngineering/comments/pny8r/reverse_engineering_of_binary_device_drivers_with/Falset5_2qmd0FalseFalset3_pny8rhttp://infoscience.epfl.ch/record/146734/files/revnic.pdf
1326312588.017fumalwareanalysis.blogspot.comocsdaStarling Technique and Hijacking Kernel System Calls using Hardware Breakpoints digduggg2361http://www.reddit.com/r/ReverseEngineering/comments/ocsda/starling_technique_and_hijacking_kernel_system/Falset5_2qmd0FalseFalset3_ocsdahttp://fumalwareanalysis.blogspot.com/2012/01/malware-analysis-tutorial-11-starling.html
1326012644.017code.google.como7svlPortable Executable oddities (with binary and source) [updated]simpleuser2360http://www.reddit.com/r/ReverseEngineering/comments/o7svl/portable_executable_oddities_with_binary_and/Falset5_2qmd0FalseFalset3_o7svlhttp://code.google.com/p/corkami/wiki/PE?show=content
1324841282.017facebook.comnqdrhStudents hack powered wheel chair, make wireless, stream video contentTheArchitect112473http://www.reddit.com/r/ReverseEngineering/comments/nqdrh/students_hack_powered_wheel_chair_make_wireless/Falset5_2qmd0FalseFalset3_nqdrhhttp://www.facebook.com/video/video.php?v=107440639271508
1323915156.017self.ReverseEngineeringnd7fmDebugger friendly for Ollydbg Users for x64?AaronOpfer20314http://www.reddit.com/r/ReverseEngineering/comments/nd7fm/debugger_friendly_for_ollydbg_users_for_x64/I've grown to like Ollydbg a lot and even use it to debug programs when I have the source available. I also find its method of making patches to running programs to be very straight-forward and simple. Unfortunately, it simply doesn't work on 64-bit processes.Does anyone have any debuggers they suggest for people looking for something very similar to ollydbg but capable of debugging 64 bit processes?Falset5_2qmd0FalseTruet3_nd7fmhttp://www.reddit.com/r/ReverseEngineering/comments/nd7fm/debugger_friendly_for_ollydbg_users_for_x64/
1320152327.018redmine.honeynet.orglwd9wAndroid Reverse Engineering Wikitechnoskald2461http://www.reddit.com/r/ReverseEngineering/comments/lwd9w/android_reverse_engineering_wiki/Falset5_2qmd0FalseFalset3_lwd9whttp://redmine.honeynet.org/projects/are/wiki
1317687188.016nebelwelt.netkzxr5fastBT - The Fast Binary Translation Frameworkclampwick1934http://www.reddit.com/r/ReverseEngineering/comments/kzxr5/fastbt_the_fast_binary_translation_framework/Falset5_2qmd0FalseFalset3_kzxr5http://nebelwelt.net/projects/fastbt/
1316563481.018bitly.comkm5qmVolatility 2.0 Vscan virus scanning plugindigduggg2022http://www.reddit.com/r/ReverseEngineering/comments/km5qm/volatility_20_vscan_virus_scanning_plugin/Falset5_2qmd0FalseFalset3_km5qmhttps://bitly.com/oj4UxY
1316017976.018self.ReverseEngineeringkfhta[hiring] Root Labs Seeks Lead Engineer for Code Analysis ProductNateLawson2244http://www.reddit.com/r/ReverseEngineering/comments/kfhta/hiring_root_labs_seeks_lead_engineer_for_code/[(Complete job posting here)](http://rootlabs.com/developer-job.html)We are a fully-funded startup building a web-based service for analyzing and searching code. You will be in charge of building a large, distributed computing system for parsing and indexing code for our search engine. We've been creating the code analysis tools for existing customers, and we need you to build the automation framework to help us scale.This is not yet another project to mine social networks to create ads! Some of the capabilities you will implement are:* Nearest-neighbor search in high dimension (or knowing how to avoid this by projecting to a lower dimension)* Classifying code by various metrics* Map/reduce deconstruction of complex queries* Distributed computing design, cluster management, software deployment, load balancing **Requirements**Exceptional at:* Python or Ruby* C/C++* Unix programming (Linux and/or FreeBSD)* Working independently to solve problems, manage time, and be self-motivated Good working understanding of:* MySQL or PostgreSQL* Key/value stores, especially Riak and Redis* Cluster management and Unix admin (Fabric and Chef)* Compilers, linkers, and language toolchain internals in general Strong interest in:* Low-level computing (assembly language, linkers/loaders, compiler optimizer design, intermediate languages)* Using the right algorithm and implementation for the right problem. Knowing how to do profiling and basic statistics to make that choice.* Machine learning: clustering, classification (locality-sensitive hashing, SVMs)* Distributed systems and fault-tolerant computing (BigTable, GFS, Dynamo, and similar designs)* At least one assembly language (x86 preferred)We're only interested in people who produce working code and deploy it. This is not a research position involving modeling and R. We're a fast-paced company -- if you run into a problem, it's often best to come up with a heuristic and continue around it. You don't have to implement program analysis tools yourself, but you'll be building tools in Python and C/C++ that analyze the data we've extracted from the code.Interested? Email a resume and links to code you've written to engineer-job@rootlabs.comMore info: http://rootlabs.com/developer-job.htmlFalset5_2qmd0FalseTruet3_kfhtahttp://www.reddit.com/r/ReverseEngineering/comments/kfhta/hiring_root_labs_seeks_lead_engineer_for_code/
1313459161.017reversemode.comjjzsaReverse Mode: Reversing DELL's DRAC firmware1814http://www.reddit.com/r/ReverseEngineering/comments/jjzsa/reverse_mode_reversing_dells_drac_firmware/Falset5_2qmd0FalseFalset3_jjzsahttp://reversemode.com/index.php?option=com_content&task=view&id=77&Itemid=1
1310474246.018mcdermottcybersecurity.comincu4Windows x64 Shellcodepolsab1910http://www.reddit.com/r/ReverseEngineering/comments/incu4/windows_x64_shellcode/Falset5_2qmd0FalseFalset3_incu4http://mcdermottcybersecurity.com/articles/windows-x64-shellcode
1309458163.017duxcore.comidgyaNew debugger disassembler x64C_REV2142http://www.reddit.com/r/ReverseEngineering/comments/idgya/new_debugger_disassembler_x64/Falset5_2qmd0FalseFalset3_idgyahttp://www.duxcore.com/products.html
1309316622.017matasano.comibxptKivlad v0.1 source code, a native decompiler for Dalvik binariesrolfr1810http://www.reddit.com/r/ReverseEngineering/comments/ibxpt/kivlad_v01_source_code_a_native_decompiler_for/Falset5_2qmd0FalseFalset3_ibxpthttp://www.matasano.com/research/kivlad/
1302277503.016vusb-analyzer.sourceforge.netglj1lVirtual USB Analyzer - Tutorial1820http://www.reddit.com/r/ReverseEngineering/comments/glj1l/virtual_usb_analyzer_tutorial/Falset5_2qmd0FalseFalset3_glj1lhttp://vusb-analyzer.sourceforge.net/tutorial.html
1300847723.017recon.cxg9eh5Recon registration open! crymsen1819http://www.reddit.com/r/ReverseEngineering/comments/g9eh5/recon_registration_open/Falset5_2qmd0FalseFalset3_g9eh5http://recon.cx/2011/conference.html
1297182617.019hex-rays.comfhkw2Hex-Rays Bug Bountyrolfr23410http://www.reddit.com/r/ReverseEngineering/comments/fhkw2/hexrays_bug_bounty/Falset5_2qmd0FalseFalset3_fhkw2http://www.hex-rays.com/bugbounty.shtml
1293596958.017autodiff.piotrbania.comeswpsAutoDiff - Automated Binary Differential Analysis 1920http://www.reddit.com/r/ReverseEngineering/comments/eswps/autodiff_automated_binary_differential_analysis/Falset5_2qmd0FalseFalset3_eswpshttp://autodiff.piotrbania.com/index_date.php?month=12&year=2010
1291950574.015self.ReverseEngineeringejbcjAsk Reddit: CUDA programmingynoise2057http://www.reddit.com/r/ReverseEngineering/comments/ejbcj/ask_reddit_cuda_programming/I recently purchased a NVIDIA GTX 465 GPU and, despite playing games, I want to put it to better use in RE. Because I'm very short of ideas I kindly ask your help ;) My own (possibly dumb) ideas are: 1) Code a POC virus that runs on the GPU (has anyone done it before?);2) Port ssdeep to CUDA just to learn the basics of CUDA programming;3) Code a basic fuzzer (mainly for fuzzing video and image formats I guess).Falset5_2qmd0TrueTruet3_ejbcjhttp://www.reddit.com/r/ReverseEngineering/comments/ejbcj/ask_reddit_cuda_programming/
1291050266.019201002.confidence.org.pledeb7ESET Crackme Contest1906http://www.reddit.com/r/ReverseEngineering/comments/edeb7/eset_crackme_contest/Falset5_2qmd0FalseFalset3_edeb7http://201002.confidence.org.pl/crack-me
1289637727.018resources.infosecinstitute.come5j2pStep-by-Step Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit - Part Onewtbw2136http://www.reddit.com/r/ReverseEngineering/comments/e5j2p/stepbystep_reverse_engineering_malware_zeroaccess/Falset5_2qmd0FalseFalset3_e5j2phttp://resources.infosecinstitute.com/step-by-step-tutorial-on-reverse-engineering-malware-the-zeroaccessmaxsmiscer-crimeware-rootkit/
1289581889.018nakedsecurity.sophos.come57jcMalicious PDFs find a novel way of running JavaScriptwishi2240http://www.reddit.com/r/ReverseEngineering/comments/e57jc/malicious_pdfs_find_a_novel_way_of_running/Falset5_2qmd0FalseFalset3_e57jchttp://nakedsecurity.sophos.com/2010/11/12/malicious-pdfs-running-javascript/
1289559395.015self.ReverseEngineeringe52plReverse Engineering of hardware? Where to start?aw4lly1837http://www.reddit.com/r/ReverseEngineering/comments/e52pl/reverse_engineering_of_hardware_where_to_start/Hey everyone,I read a post on here about hacking the Boxee Box today which got me thinking again about something I've been interested in for quite a while. Reverse Engineering of Hardware. I was wondering if anyone on here has done any hardware reverse engineering and would have any advice where to start or if they know of anywhere I could learn how to do it, hardware/software I should have, easy devices to start on, tutorials, anything would be amazing. I've done a lot of embedded programming on Microcontrollers and FPGA's but really just don't know where to start with it.Any help you can give would be amazing.Falset5_2qmd0FalseTruet3_e52plhttp://www.reddit.com/r/ReverseEngineering/comments/e52pl/reverse_engineering_of_hardware_where_to_start/
1287767661.016abysssec.comduyg5Adobe Shockwave player rcsL chunk memory corruption 0day 1823http://www.reddit.com/r/ReverseEngineering/comments/duyg5/adobe_shockwave_player_rcsl_chunk_memory/Falset5_2qmd0FalseFalset3_duyg5http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/
1287058888.017xorl.wordpress.comdr4nfLinux GLibC Stack Canary Valuessanitybit1920http://www.reddit.com/r/ReverseEngineering/comments/dr4nf/linux_glibc_stack_canary_values/Falset5_2qmd0FalseFalset3_dr4nfhttps://xorl.wordpress.com/2010/10/14/linux-glibc-stack-canary-values/
1286987988.015pentest.cryptocity.netdqqprReversing for Vulnerability Analysis (part 2) with Aaron Portnoy and Peter Silbermandguido2162http://www.reddit.com/r/ReverseEngineering/comments/dqqpr/reversing_for_vulnerability_analysis_part_2_with/Falset5_2qmd0FalseFalset3_dqqprhttp://pentest.cryptocity.net/reverse-engineering/reverse-engineering-102.html
1280163114.016washingtonpost.comctv9aNew RE exemptions to the DMCA (jailbreaking, phone unlocking, dongle cracking, vuln research?)wtbw2265http://www.reddit.com/r/ReverseEngineering/comments/ctv9a/new_re_exemptions_to_the_dmca_jailbreaking_phone/Falset5_2qmd0FalseFalset3_ctv9ahttp://www.washingtonpost.com/wp-dyn/content/article/2010/07/26/AR2010072602813.html
1277514390.016hex-rays.comcj501IDA Pro 5.7 released - what's newigor_sk1939http://www.reddit.com/r/ReverseEngineering/comments/cj501/ida_pro_57_released_whats_new/Falset5_2qmd0FalseFalset3_cj501http://www.hex-rays.com/idapro/57/index.htm
1271952766.016download.savannah.gnu.orgbuos4Programming from the Ground Up [PDF]1710http://www.reddit.com/r/ReverseEngineering/comments/buos4/programming_from_the_ground_up_pdf/Falset5_2qmd0FalseFalset3_buos4http://download.savannah.gnu.org/releases-noredirect/pgubook/ProgrammingGroundUp-1-0-booksize.pdf
1271199679.017uvicrec.blogspot.combqi9tIntegrated Circuit Reverse Engineering1701http://www.reddit.com/r/ReverseEngineering/comments/bqi9t/integrated_circuit_reverse_engineering/Falset5_2qmd0FalseFalset3_bqi9thttp://uvicrec.blogspot.com/
1269910536.017skullsecurity.orgbjxvcTaking apart the Energizer trojanwtbw1700http://www.reddit.com/r/ReverseEngineering/comments/bjxvc/taking_apart_the_energizer_trojan/Falset5_2qmd0FalseFalset3_bjxvchttp://www.skullsecurity.org/blog/?p=627
1268084826.016openrce.orgbauclCompiler Optimizations for Reverse Engineersrolfr1713http://www.reddit.com/r/ReverseEngineering/comments/baucl/compiler_optimizations_for_reverse_engineers/Falset5_2qmd0FalseFalset3_bauclhttp://www.openrce.org/blog/view/1554/Compiler_Optimizations_for_Reverse_Engineers
1265361291.018griffin.netayd7dHacking the Amazon Kindle DXcavedave1910http://www.reddit.com/r/ReverseEngineering/comments/ayd7d/hacking_the_amazon_kindle_dx/Falset5_2qmd0FalseFalset3_ayd7dhttp://www.griffin.net/2010/01/hacking-the-amazon-kindle-dx-part-1.html
1263823103.017self.ReverseEngineeringar0ajRecommendation on a good Linux hex editor?Poromenos21439http://www.reddit.com/r/ReverseEngineering/comments/ar0aj/recommendation_on_a_good_linux_hex_editor/Do you guys know if Hiew runs in Linux? Which hex editor do you use?Falset5_2qmd0FalseTruet3_ar0ajhttp://www.reddit.com/r/ReverseEngineering/comments/ar0aj/recommendation_on_a_good_linux_hex_editor/
1256192652.017i.imgur.com9wjjxViva La Revolucióncloudburst2477http://www.reddit.com/r/ReverseEngineering/comments/9wjjx/viva_la_revolución/Falset5_2qmd0FalseFalset3_9wjjxhttp://i.imgur.com/Yt8We.jpg
1247762986.017veracode.com91tgjBlackBerry Spyware Dissectedrolfr2140http://www.reddit.com/r/ReverseEngineering/comments/91tgj/blackberry_spyware_dissected/Falset5_2qmd0FalseFalset3_91tgjhttp://www.veracode.com/blog/2009/07/blackberry-spyware-dissected/
1247070322.016programmerfish.com8zcaoSource Code of Several Atari 7800 Games Releasedrolfr2151http://www.reddit.com/r/ReverseEngineering/comments/8zcao/source_code_of_several_atari_7800_games_released/Falset5_2qmd0FalseFalset3_8zcaohttp://www.programmerfish.com/source-code-of-several-7800-games-released/
1244669625.015wandel.ca8rh9dNice example of a high-quality disassemblyrolfr1722http://www.reddit.com/r/ReverseEngineering/comments/8rh9d/nice_example_of_a_highquality_disassembly/Falset5_2qmd0FalseFalset3_8rh9dhttp://wandel.ca/homepage/execdis/exec_disassembly.txt
1244542844.016self.ReverseEngineering8qzk0Hi Reddit, I'm reading 'The Blue Nowhere' by Jeffery Deaver. It's flawed but I'm enjoying it. It's a fiction about hackers, the internet, programming and other cool stuff. It even contains some intel asm :) Are there any other such 'hardcore' books ?mco2048http://www.reddit.com/r/ReverseEngineering/comments/8qzk0/hi_reddit_im_reading_the_blue_nowhere_by_jeffery/Falset5_2qmd0FalseTruet3_8qzk0http://www.reddit.com/r/ReverseEngineering/comments/8qzk0/hi_reddit_im_reading_the_blue_nowhere_by_jeffery/
1223969039.016openrce.org77021The Viral Darwinism of W32.Evolrolfr1820http://www.reddit.com/r/ReverseEngineering/comments/77021/the_viral_darwinism_of_w32evol/Falset5_2qmd0FalseFalset3_77021http://www.openrce.org/articles/full_view/27
1374973752.016ece.vt.edu1j6x48Dynamic Analysis and Debugging of Binary Code for Security Applications [PDF]rolfr2040http://www.reddit.com/r/ReverseEngineering/comments/1j6x48/dynamic_analysis_and_debugging_of_binary_code_for/Falset5_2qmd0FalseFalset3_1j6x48http://www.ece.vt.edu/chaowang/pubDOC/Li13SymRAS.pdf
1374761433.015youtube.com1j10byChristopher Domas The future of RE, Dynamic Binary Visualizationezrakh1729http://www.reddit.com/r/ReverseEngineering/comments/1j10by/christopher_domas_the_future_of_re_dynamic_binary/Falset5_2qmd0FalseFalset3_1j10byhttp://www.youtube.com/watch?v=4bM3Gut1hIk
1374177866.017shell-storm.org1ikypaThe slides of my talk at LSE summer week 2013 - Software testing and concolic executionjonathansalwan2140http://www.reddit.com/r/ReverseEngineering/comments/1ikypa/the_slides_of_my_talk_at_lse_summer_week_2013/Falset5_2qmd0FalseFalset3_1ikypahttp://shell-storm.org/talks/Software_testing_and_concolic_execution_Jonathan_Salwan_LSE_2013.pdf
1373560296.017blog.opensecurityresearch.com1i37blBasic Reversing - WebEx One-Click Password Storagefoundstone2144http://www.reddit.com/r/ReverseEngineering/comments/1i37bl/basic_reversing_webex_oneclick_password_storage/Falset5_2qmd0FalseFalset3_1i37blhttp://blog.opensecurityresearch.com/2013/07/quick-reversing-webex-one-click.html
1373496723.017self.ReverseEngineering1i1hjxIs it possible to become good at RE without being good programming?fierycatnet26935http://www.reddit.com/r/ReverseEngineering/comments/1i1hjx/is_it_possible_to_become_good_at_re_without_being/Right now I am teaching myself how to program while working on CS but I am also interested in security, malware, reversing. I've been dabbling with many things and tools but somethng spark my interest in RE again.So my question is, would it be possible to get good at REing without being good at programming? I can put together some basic scrips and I am still learning more but the thing is, I have more of analytical mind. I like to analyze data, research, and put the puzzle together. I don't know a lot about REing but it seems like I am more inclined towards braking things and messing with existing code base rather than making something on my own from scratch. I have more difficulties starting a project or writting a paper, I could spend hours on the way I want to express my idea and how to present it but I am pretty quick on extracting data, understanding underlying concepts and etc. Would it be safe to say that maybe RE, malware analyst, pentest, etc. would be a better fit for me? Any of you guys who are not stellar programmers doing RE work for a living? I am not afraid of some C code or whatever, I'd just rather not write it. If I do need to write something, I prefer high level language like Ruby/Python and libraries.Falset5_2qmd0FalseTruet3_1i1hjxhttp://www.reddit.com/r/ReverseEngineering/comments/1i1hjx/is_it_possible_to_become_good_at_re_without_being/
1370878197.017inf.u-szeged.hu1g1s40Constructing control flows graphs of binary executable programs at post-link time. US Patent 7,207,038 [PDF]perror2145http://www.reddit.com/r/ReverseEngineering/comments/1g1s40/constructing_control_flows_graphs_of_binary/Falset5_2qmd0FalseFalset3_1g1s40http://www.inf.u-szeged.hu/~akiss/pub/pdf/bicsak_cfg.pdf
1370001426.016seclists.org1fedfaCall For Papers - Ekoparty security conference 2013galapag01930http://www.reddit.com/r/ReverseEngineering/comments/1fedfa/call_for_papers_ekoparty_security_conference_2013/Falset5_2qmd0FalseFalset3_1fedfahttp://seclists.org/fulldisclosure/2013/May/222
1369025230.016x86obf.blogspot.com1eodd8x86obf - virtualizer binary sampletzubcic2046http://www.reddit.com/r/ReverseEngineering/comments/1eodd8/x86obf_virtualizer_binary_sample/Falset5_2qmd0FalseFalset3_1eodd8http://x86obf.blogspot.com/2013/05/x86obf-binary-example.html
1365088072.016www-304.ibm.com1bnx3mUse-after-frees: That pointer may be pointing to something badpolsab2481http://www.reddit.com/r/ReverseEngineering/comments/1bnx3m/useafterfrees_that_pointer_may_be_pointing_to/Falset5_2qmd0FalseFalset3_1bnx3mhttps://www-304.ibm.com/connections/blogs/xforce/entry/use_after_frees_that_pointer_may_be_pointing_to_something_bad?lang=en_us
1363626697.015naveensrinivasan.com1aj7y7Using Mono Cecil Decompiler within Windbg to decompile ILigor_sk1940http://www.reddit.com/r/ReverseEngineering/comments/1aj7y7/using_mono_cecil_decompiler_within_windbg_to/Falset5_2qmd0FalseFalset3_1aj7y7http://naveensrinivasan.com/2010/06/08/using-mono-cecil-decompiler-within-windbg-to-decompile/
1363300122.017corkami.googlecode.com1ababoa schizophrenic PDF, working differently on 3 different viewerssimpleuser2145http://www.reddit.com/r/ReverseEngineering/comments/1ababo/a_schizophrenic_pdf_working_differently_on_3/Falset5_2qmd0FalseFalset3_1ababohttps://corkami.googlecode.com/svn/trunk/src/pdf/standard.pdf
1358973314.017volatility-labs.blogspot.com1755woExtracting Hidden API-Hooking BHO DLLs with Volatilitytranst2360http://www.reddit.com/r/ReverseEngineering/comments/1755wo/extracting_hidden_apihooking_bho_dlls_with/Falset5_2qmd0FalseFalset3_1755wohttp://volatility-labs.blogspot.com/2013/01/howto-extract-hidden-api-hooking-bho.html
1358926328.017self.ReverseEngineering1741o3Polymorphic engineDuncanMcloud2478http://www.reddit.com/r/ReverseEngineering/comments/1741o3/polymorphic_engine/Hello Friends,Can someone point me to articles / papers / code on writing polymorphic engines? I've done some searching and was not happy with the quality of results from Google.Falset5_2qmd0FalseTruet3_1741o3http://www.reddit.com/r/ReverseEngineering/comments/1741o3/polymorphic_engine/
1358607590.015ge.tt16vkxkIt's not much but I have written a short guide about the interactive Hopper Disassembler [PDF]kracksundkatzen2052http://www.reddit.com/r/ReverseEngineering/comments/16vkxk/its_not_much_but_i_have_written_a_short_guide/Falset5_2qmd0FalseFalset3_16vkxkhttp://ge.tt/5ruRBrV/v/0?c
1356060419.015android-decompiler.com157gbiJEB vs. JAD vs. JD output comparisonsrolfr2166http://www.reddit.com/r/ReverseEngineering/comments/157gbi/jeb_vs_jad_vs_jd_output_comparisons/Falset5_2qmd0FalseFalset3_157gbihttp://www.android-decompiler.com/comp.php
1355277260.016self.ReverseEngineering14p7zyRE IRC channels?Greg122118226http://www.reddit.com/r/ReverseEngineering/comments/14p7zy/re_irc_channels/I'm looking for some IRC channels to talk with like minded people. Any that you guys frequent? Falset5_2qmd0FalseTruet3_14p7zyhttp://www.reddit.com/r/ReverseEngineering/comments/14p7zy/re_irc_channels/
1354583078.015self.ReverseEngineering148faaXbox 360 controller on Windowsvoltagex24930http://www.reddit.com/r/ReverseEngineering/comments/148faa/xbox_360_controller_on_windows/Has anyone worked much with the Xbox controller on Windows? I've got most functions working with SharpDX, but the 'guide' (centre) button isn't exposed at allDoes anyone have any ideas how it works? The software is here: http://download.microsoft.com/download/6/9/4/69446ACF-E625-4CCF-8F56-58B589934CD3/Xbox360_64Eng.exe and the exe I'm most interested in is XboxStat.exe - it responds to the guide button being pressed.The function may also be hidden in one of the xinput*.dll files, c.f. https://github.com/mendhak/xbox-controller-off/blob/master/XBoxControllerOff/Program.csFalset5_2qmd0FalseTruet3_148faahttp://www.reddit.com/r/ReverseEngineering/comments/148faa/xbox_360_controller_on_windows/
1353339523.017j00ru.vexillium.org13gc7eWindows Kernel Reference Count Vulnerabilities — Case StudyN3mes1s2140http://www.reddit.com/r/ReverseEngineering/comments/13gc7e/windows_kernel_reference_count_vulnerabilities/Falset5_2qmd0FalseFalset3_13gc7ehttp://j00ru.vexillium.org/dump/zn_slides.pdf
1352597515.016program-transformation.org12zn43History Of Decompilationturnersr1930http://www.reddit.com/r/ReverseEngineering/comments/12zn43/history_of_decompilation/Falset5_2qmd0FalseFalset3_12zn43http://www.program-transformation.org/Transform/HistoryOfDecompilation1
1352387269.014self.ReverseEngineering12uxbmHow to build IDA processor modules under Linux?tripsandleaves2173http://www.reddit.com/r/ReverseEngineering/comments/12uxbm/how_to_build_ida_processor_modules_under_linux/Hey guys. So i just finished writing a sample ida processor module for a small VM. I have implemented all the parts(ins,reg,ana,emu,out) and successfully build the .ilx. However, I cant get IDA to display my module in the processor drop down menu. Reading the IDA Pro Book, Eagle says that IDA needs a description string within the module to be able to load the processor module. A utility is supplied with the IDA SDK(I am using 6.2), called mkidp.exe which is supposed to insert this description string within the PE header of the module. Yeah, PE. But I just built an ELF module. How else do I get IDA to recognize my module? TLDR; First time IDA(6.2) proc mod writer in Linux, cant get IDA to recognize module in dropdown, What am I doing wrong? Falset5_2qmd01352387535.0Truet3_12uxbmhttp://www.reddit.com/r/ReverseEngineering/comments/12uxbm/how_to_build_ida_processor_modules_under_linux/
1351522610.017blog.crowdstrike.com129zi3Unpacking Dynamically Allocated Codeffffdddddssss2035http://www.reddit.com/r/ReverseEngineering/comments/129zi3/unpacking_dynamically_allocated_code/Falset5_2qmd0FalseFalset3_129zi3http://blog.crowdstrike.com/2012/10/unpacking-dynamically-allocated-code.html
1351278185.016ruxconbreakpoint.com124yx7Slides for the Ruxcon Breakpoint conferencerolfr1820http://www.reddit.com/r/ReverseEngineering/comments/124yx7/slides_for_the_ruxcon_breakpoint_conference/Falset5_2qmd0FalseFalset3_124yx7http://www.ruxconbreakpoint.com/slides/
1350235708.017malwaremuncher.blogspot.com11gu5xMalware Muncher: Using DLL Injection to Automatically Unpack Citadelmalwareanalyst27103http://www.reddit.com/r/ReverseEngineering/comments/11gu5x/malware_muncher_using_dll_injection_to/Falset5_2qmd0FalseFalset3_11gu5xhttp://malwaremuncher.blogspot.com/2012/10/using-dll-injection-to-automatically.html
1349451603.017volatility-labs.blogspot.com10zvxkRecovering memory mapped files from the Windows cache managertranst27100http://www.reddit.com/r/ReverseEngineering/comments/10zvxk/recovering_memory_mapped_files_from_the_windows/Falset5_2qmd0FalseFalset3_10zvxkhttp://volatility-labs.blogspot.com/2012/10/movp-44-cache-rules-everything-around.html
1348845218.015waleedassar.blogspot.com10mdgcPAGE_EXECUTE_WRITECOPY As Anti-Debug Trickwaliedassar2053http://www.reddit.com/r/ReverseEngineering/comments/10mdgc/page_execute_writecopy_as_antidebug_trick/Falset5_2qmd0FalseFalset3_10mdgchttp://waleedassar.blogspot.com/2012/09/pageexecutewritecopy-as-anti-debug-trick.html
1348108284.017blog.delroth.net10673uRandom thoughts about writing an IDA processor modulerolfr2250http://www.reddit.com/r/ReverseEngineering/comments/10673u/random_thoughts_about_writing_an_ida_processor/Falset5_2qmd0FalseFalset3_10673uhttp://blog.delroth.net/2011/11/random-thoughts-about-writing-an-ida-processor-module/
1346884212.016paper.ijcsns.orgzf0ogCamouflage in Malware: from Encryption to Metamorphism [PDF]rolfr2480http://www.reddit.com/r/ReverseEngineering/comments/zf0og/camouflage_in_malware_from_encryption_to/Falset5_2qmd0FalseFalset3_zf0oghttp://paper.ijcsns.org/07_book/201208/20120813.pdf
1345245305.015usenix.orgyei5tBaseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacksmageek2050http://www.reddit.com/r/ReverseEngineering/comments/yei5t/baseband_attacks_remote_exploitation_of_memory/Falset5_2qmd0FalseFalset3_yei5thttps://www.usenix.org/system/files/conference/woot12/woot12-final24.pdf
1344627126.017usenix.orgy0g0kEnhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization [PDF]rolfr2140http://www.reddit.com/r/ReverseEngineering/comments/y0g0k/enhanced_operating_system_security_through/Falset5_2qmd0FalseFalset3_y0g0khttps://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final181.pdf