Tag: reverse-engineering
-
Ghidra: Open-source software reverse engineering framework
Ghidra, a cutting-edge open-source software reverse engineering (SRE) framework, is a product of the National Security Agency (NSA) Research Directora… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/06/17/ghidra-nsa-open-source-software-reverse-engineering-framework/
-
Radare: Open-source reverse engineering framework
Radare is an open-source UNIX-like reverse engineering framework and command-line toolset. It can be scripted, modified, and used for batch analysis. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/06/10/radare-open-source-reverse-engineering-framework/
-
Hackers Leverage AI as Application Security Threats Mount
Reverse-engineering tools, rising jailbreaking activities, and the surging use of AI and ML to enhance malware development were among the worrying tre… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/hackers-leverage-ai-as-application-security-threats-mount/
-
Reverse Engineering Electron Apps to Discover APIs
Learn how to reverse engineer an Electron app to find artifacts like source code and API endpoints, and capture live traffic with Burp Suite. The post… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/reverse-engineering-electron-apps-to-discover-apis/
-
[Video] Practical Exploitation of Embedded Systems
PRESENTATION ABSTRACT: For the 10th anniversary of HITB we keep it old school with an in-depth exploration of the reverse engineering and exploitation… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/fTY9fOE2J-0/6320
-
[Video] REVERSE ENGINEERING A MASS TRANSIT TICKETING SYSTEM
This talk will look at different techniques used in black-box reverse engineering of data storage formats, focusing on a case study of an outdated mas… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/awRyxAufxDQ/6202
-
[Video] SkyDogCon 2012 – RE, CND, Geopolitics, Oh My!
This session will delve into reverse engineering on a highly publicized piece of malware. A VMware image or ISO image will be made available to the at… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/JsRYZLrk_Ok/6151
-
[Video] Re-Engineering Android Applications
This video is all about how Attacker making changes in Android app using Reverse-Engineering for insert additional functionality, and recompiling, but… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/oaw85kNV49I/6057
-
[Video] Crack a program with OllyDbg
In this video you will learn how to Crack a program using OllyDBG. As you know OllyDBG is a Reverse Engineering tool so using this tool on windows he … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/IyDDNADqC6U/6039
-
[Video] Reverse Engineering Mobile Applications
As organizations adopt mobile computing devices to support their mission, the adversaries are beginning to change their tools, techniques, and procedu… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/AWXbhtTGLKY/6017
-
[Video] Hack3rcon^ 3 – Linux exploit development
In this course we will be teaching basic exploit development on a linux os. If you haven’t used gdb or done much reverse engineering, this class will … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/sDgXcNoZA6U/6012
-
[Video] Code Maturity: Is SDL a Waste of Time?
Tags: reverse-engineeringChief Security Specialist at SecuniaCarsten Eiram comes from a reverse engineering background and is currently the Chief Security Specialist at Secuni… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/VoEFkDfcwEA/5849
-
[Video] 28C3 engineering a Qualcomm baseband
Tags: reverse-engineeringReverse-engineering a Qualcomm basebandDespite their wide presence in our lives, baseband chips are still nowadays poorly known and understood from a … First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/Xlq3u8lSTA0/5434
-
[Video] Deepsec – Android: Reverse Engineering and Forensics
Slides : – deepsec.net/docs/Slides/DeepSec_2010_Reverse_Forensics.pdf Raphal Rigo, French Network and Information Security Agency (ANSSI)While… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/xlIrnMpf1PQ/5373

