Reverse engineering

Buffer Overflow Attack & Defense

Abstract This paper attempts to explain one of the critical buffer overflow vulnerabilities and its detection approaches that check the referenced buffers at

Invoking Assembly Code in C#

Abstract This article explains the techniques of inline Assembly programming by linking or invoking the CPU-dependent Native Assembly 32-bit code to C#.NET m

iOS Application Security Part 32 - Automating tasks with iOS Reverse Engineering Toolkit (iRET)

While doing security audit of iOS apps, there are a lot of tasks that we have to repeat every time. This includes finding out the class information for the a

Hooking IDT

Download the code associated with this article by filling out the the form below.  Once we've already gained access to the system, we can use various post

A Guide to Debugging Android Binaries

In this paper, I'll describe how to start reverse code engineering in Android devices. In this tutorial, you'll learn: Installation & configuration of A

Kernel debugging with Qemu and WinDbg

If you're used WinDbg before, you might already know that you can debug the whole Windows operating system with it. To do that, you must have two Windows ope

Shared Folders with Samba and Qemu

In this tutorial we'll take a look at how we can install and configure the Samba server on a host operating system to create a shared folder, which the guest

Testing Hooks via the Windows Debugger – An Introduction to RevEngX

RevEngX RevEngX is a freely available extension for the Debugging Tools for Windows. It offers several new commands to simplify the work of reverse engineeri

Reverse Engineering with Reflector

Abstract We have already got the taste of reverse engineering with Reflector in the previous paper. It was basically a kick-start about this dissembling tool

Applied Reverse Engineering with IDA Pro

This editorial is committed to subverting the essential security restriction mechanisms of a native binary executable by employing the IDA Pro Dissembler. Th