Tag: reverse-engineering
-
AMD data center chips vulnerable to revealing data through ‘BadRAM’ attack
by
in SecurityNews
Tags: access, advisory, attack, best-practice, cloud, cve, data, encryption, exploit, finance, firmware, flaw, germany, Hardware, mitigation, monitoring, reverse-engineering, software, update, vulnerabilityAMD’s Secure Encrypted Virtualization (SEV), meant to protect processor memory from prying eyes in virtual machine (VM) environments, can be tricked into giving access to its encrypted memory contents using a test rig costing less than $10, researchers have revealed.Dubbed “BadRAM” by researchers from the University of Lübeck in Germany, KU Leven in Belgium, and…
-
Researchers Released hrtng IDA Pro Plugin for Malware Analyst to Make Reverse Engineering Easy
by
in SecurityNewsThe Global Research and Analysis Team (GReAT) has announced the release of hrtng, a cutting-edge plugin for IDA Pro, one of the most prominent tools for reverse engineering. Designed specifically to enhance the efficiency of malware analysis, hrtng provides analysts with powerful features that automate and simplify the otherwise intricate tasks involved in dissecting malicious binaries. The…
-
Sixgen’s Kyrus Acquisition Boosts National Cybersecurity
by
in SecurityNewsBuy of Washington D.C.-Area Firm Adds Reverse Engineering, Data Analytics Expertise. Sixgen will enhance its cybersecurity operations through the purchase of Washington D.C.-area Kyrus. The move introduces reverse engineering and analytics expertise to Sixgen’s portfolio, aligning with its mission to protect critical infrastructure and bolster American cyber defense capabilities. First seen on govinfosecurity.com Jump to…
-
17 hottest IT security certs for higher pay today
by
in SecurityNews
Tags: access, ai, attack, automation, blockchain, business, ceo, cisa, ciso, cloud, communications, conference, container, control, credentials, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, finance, fortinet, google, governance, group, guide, hacker, incident response, infosec, infrastructure, intelligence, Internet, jobs, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-management, skills, software, technology, threat, tool, training, windowsWith the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful signposts.Analyzing more than 638 certifications as part of its 3Q 2024 “IT Skills Demand and Pay Trends Report,” Foote Partners…
-
iOS 18 added secret and smart security feature that reboots iThings after three days
by
in SecurityNews
Tags: reverse-engineeringSecurity researcher’s reverse engineering effort reveals undocumented reboot timer that will make life harder for attackers First seen on theregister.com Jump to article: www.theregister.com/2024/11/19/ios_18_secret_reboot/
-
DEF CON 32 Reverse Engineering MicroPython Frozen Modules
by
in SecurityNewsAuthors/Presenters: Wesley McGrew Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/def-con-32-reverse-engineering-micropython-frozen-modules/
-
x64dbg: Open-source binary debugger for Windows
by
in SecurityNewsx64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the sourc… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/08/19/x64dbg-open-source-binary-debugger-windows/
-
Reverse engineering eBPF programs
by
in SecurityNews
Tags: reverse-engineeringFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/reverse-engineering-ebpf-programs/
-
USENIX Security ’23 AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering
by
in SecurityNews
Tags: reverse-engineeringAuthors/Presenters:Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, Chao Zhang Many thanks to Presenter… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/usenix-security-23-aifore-smart-fuzzing-based-on-automatic-input-format-reverse-engineering/
-
Ghidra: Open-source software reverse engineering framework
by
in SecurityNewsGhidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directora… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/06/17/ghidra-nsa-open-source-software-reverse-engineering-framework/
-
Radare: Open-source reverse engineering framework
by
in SecurityNewsRadare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/06/10/radare-open-source-reverse-engineering-framework/
-
Hackers Leverage AI as Application Security Threats Mount
by
in SecurityNewsReverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying tre… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/hackers-leverage-ai-as-application-security-threats-mount/
-
Reverse Engineering Electron Apps to Discover APIs
by
in SecurityNewsLearn how to reverse engineer an Electron app to find artifacts like source code and API endpoints, and capture live traffic with Burp Suite. The post… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/reverse-engineering-electron-apps-to-discover-apis/
-
[Video] Practical Exploitation of Embedded Systems
by
in SecurityNewsPRESENTATION ABSTRACT: For the 10th anniversary of HITB we keep it old school with an in-depth exploration of the reverse engineering and exploitation… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/fTY9fOE2J-0/6320
-
[Video] REVERSE ENGINEERING A MASS TRANSIT TICKETING SYSTEM
by
in SecurityNewsThis talk will look at different techniques used in black-box reverse engineering of data storage formats, focusing on a case study of an outdated mas… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/awRyxAufxDQ/6202
-
[Video] SkyDogCon 2012 – RE, CND, Geopolitics, Oh My!
by
in SecurityNewsThis session will delve into reverse engineering on a highly publicized piece of malware. A VMware image or ISO image will be made available to the at… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/JsRYZLrk_Ok/6151
-
[Video] Re-Engineering Android Applications
by
in SecurityNewsThis video is all about how Attacker making changes in Android app using Reverse-Engineering for insert additional functionality, and recompiling, but… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/oaw85kNV49I/6057
-
[Video] Crack a program with OllyDbg
by
in SecurityNewsIn this video you will learn how to Crack a program using OllyDBG. As you know OllyDBG is a Reverse Engineering tool so using this tool on windows he … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/IyDDNADqC6U/6039
-
[Video] Reverse Engineering Mobile Applications
by
in SecurityNewsAs organizations adopt mobile computing devices to support their mission, the adversaries are beginning to change their tools, techniques, and procedu… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/AWXbhtTGLKY/6017
-
[Video] Hack3rcon^ 3 – Linux exploit development
by
in SecurityNewsIn this course we will be teaching basic exploit development on a linux os. If you haven’t used gdb or done much reverse engineering, this class will … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/sDgXcNoZA6U/6012
-
[Video] Code Maturity: Is SDL a Waste of Time?
by
in SecurityNews
Tags: reverse-engineeringChief Security Specialist at SecuniaCarsten Eiram comes from a reverse engineering background and is currently the Chief Security Specialist at Secuni… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/VoEFkDfcwEA/5849
-
[Video] 28C3 engineering a Qualcomm baseband
by
in SecurityNews
Tags: reverse-engineeringReverse-engineering a Qualcomm basebandDespite their wide presence in our lives, baseband chips are still nowadays poorly known and understood from a … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Xlq3u8lSTA0/5434
-
[Video] Deepsec – Android: Reverse Engineering and Forensics
by
in SecurityNewsSlides : – deepsec.net/docs/Slides/DeepSec_2010_Reverse_Forensics.pdf Raphal Rigo, French Network and Information Security Agency (ANSSI)While… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/xlIrnMpf1PQ/5373