HackDig : Dig high-quality web security articles for hacker

Reverse Engineering 101 – With Crack-mes

Reverse Engineering is an fascinating art of playing with low level code. In this article, we will see a hands-on tutorial for patching an exe file to accept any serial key! Tool for use: ● Ollydbg (http://www.ollydbg.de/) ● A crack-me for demonstration. You can download loads of crack-mes for hands-on practice from http://crackmes.de/ A crack-me is a small
Publish At:2017-09-15 21:40 | Read:3639 | Comments:0 | Tags:SecureLayer7 Lab Crackme Ollydbg Reverse Engineering

Reverse Engineering a JavaScript Obfuscated Dropper

1. IntroductionNowadays one of the techniques most used to spread malware on windows systems is using a JavaScript (js) dropper. A js dropper represents, in most attack scenarios, the first stage of a malware infection.It happens because Windows systems allow the execution of various scripting language using the Windows Script Host (WScript). This mean
Publish At:2017-07-31 23:15 | Read:9015 | Comments:0 | Tags:Reverse Engineering

Reverse Engineering – LAB 3

Software: IDA Pro Free (v 5.0)DLL Name: Test.dllStory about DLL:This DLL is reportedly scanning the system for running the process on the system and then send them to a hardcoded domain name. This DLL has also employed anti-analysis technique by checking the presence of known virtualization software’s etc.Steps:Load the malicious DLL into IDA Pro
Publish At:2017-07-24 17:00 | Read:3567 | Comments:0 | Tags:Reverse Engineering

18 Extensions For Turning Firefox Into a Penetration Testing Tool

Firefox is a popular web browser from Mozilla. Popularity of Firefox is not only because it’s a good web browser, it also supports add-ons to enhance the functionality. Mozilla has a website add-on section that has thousands of useful add-ons in different categories. Some of these add-ons are useful for penetration testers and security analysts.
Publish At:2017-07-11 15:30 | Read:2422 | Comments:0 | Tags:Penetration Testing feature reverse engineering

Exploiting Protostar – Stack 0-3

In this article, we will be reverse engineering and exploiting simple C programs from Protostar VM by exploit-exercises.com. We will be mainly focusing at how and why of stack overflows.Introduction:Well, there are tons of tutorials out there on stack buffer overflow, but very few of them deduce the reasoning like “why only those number of bytes
Publish At:2017-04-03 10:35 | Read:4549 | Comments:0 | Tags:Reverse Engineering exploit

Top 8 Reverse Engineering Tools for Cyber Security Professionals

Whether it is rebuilding a car engine or diagramming a sentence, people can learn about many things simply by taking them apart and putting them back together again. This process of breaking something down to understand it, build a copy to improve it, is known as reverse engineering.The process of reverse engineering was originally applied to hardware
Publish At:2017-02-23 14:25 | Read:1979 | Comments:0 | Tags:Reverse Engineering

Hacking Tools: Reverse Engineering

Reverse engineering refers to the duplication of another producer’s product following a thorough examination of its construction or composition. It involves taking apart the product to understand how it works so as to enhance or duplicate such a product. It makes it possible to understand the basic working principle and structure of the systems u
Publish At:2017-02-03 14:55 | Read:3279 | Comments:0 | Tags:Reverse Engineering

[CRITICAL] Nissan Leaf Can Be Hacked Via Web Browser From Anywhere In The World

What if a car could be controlled from a computer halfway around the world? Computer security researcher and hacker Troy Hunt has managed to do just that, via a web browser and an Internet connection, with an unmodified Nissan Leaf in another country. While so far the control was limited to the HVAC system, it’s a revealing demonstration of what’s possible.
Publish At:2016-11-20 03:20 | Read:3868 | Comments:0 | Tags:Cyber Security Cyber Security Research Security Updates 0xic

Remotely Disabling a Wireless Burglar Alarm

By Andrew Zonenberg @azonenbergCountless movies feature hackers remotely turning offsecurity systems in order to infiltrate buildings without being noticed. Buthow realistic are these depictions? Time to find out.Today we’re releasing information on a critical securityvulnerability in a wireless home security system from SimpliSafe. This system consis
Publish At:2016-11-19 20:15 | Read:4121 | Comments:0 | Tags:0-day 0day alarm Andrew Zonenberg burglar cyber attack hacki

Inside the IOActive Silicon Lab: Reading CMOS layout

By Andrew Zonenberg @azonenbergEver wondered what happens inside the IOActive silicon lab? Forthe next few weeks we’ll be posting a series of blogs that highlight some ofthe equipment, tools, attacks, and all around interesting stuff that we dothere. We’ll start off with Andrew Zonenberg explaining the basics of CMOSlayout. Basics of CMOS L
Publish At:2016-11-19 20:15 | Read:3216 | Comments:0 | Tags:Andrew Zonenberg chip CMOS hacking microchip reverse enginee

Got 15 minutes to kill? Why not root your Christmas gift?

By Tao SauvageTP-LINKNC200 and NC220 Cloud IP Cameras, which promise to let consumers “see there,when you can’t be there,” are vulnerable to an OS command injection in the PPPoEusername and password settings. An attacker can leverage this weakness to get aremote shell with root privileges. Thecameras are being marketed for surveillance, ba
Publish At:2016-11-19 20:15 | Read:6605 | Comments:0 | Tags:authentication backdoors cloud firmware analysis firmware ha

Inside the IOActive Silicon Lab: Interpreting Images

By Andrew Zonenberg @azonenbergIn the post “ReadingCMOS layout,” we discussed understanding CMOS layout in order to reverse-engineerphotographs of a circuit to a transistor-level schematic. This was all well andgood, but I glossed over an important (and often overlooked) part of theprocess: using the photos to observe and understand the circuit&
Publish At:2016-11-19 20:15 | Read:3512 | Comments:0 | Tags:Andrew Zonenberg chip hacking CMOS hacking microchip reverse

Reverse engineering a Smarter Coffee machine for fun and a security lesson

Simone Margaritelli has done a reverse engineering of the Smarter Coffee IoT Machine Protocol to control the machine from his terminal. What is the lesson? While security industry is stressing the need to adopt a security by design approach for IoT devices, security researchers continue to find flawed and poorly designed smart objects. Clearly, such kind of
Publish At:2016-10-10 09:30 | Read:3152 | Comments:0 | Tags:Breaking News Hacking Internet of Things IoT reverse enginee

Reversing Binary: Spotting Bug without Source Code

AbstractThe proficiency to unravel the complexities of a target software is called reverse engineering or just reversing. Software attackers manipulate or break the target program functionality in an unusual way resorting to some special tools often users. This article is discussing how a security bug for instance, ‘Format String’ can be sp
Publish At:2016-09-27 09:25 | Read:4522 | Comments:0 | Tags:Reverse Engineering

Reverse Engineering With Radare2 – Part 2

Welcome back to the radare2 reversing tutorials. If you’ve missed the previous parts, you can find them here and here. Last time we’ve used the rabin2 application to view the  strings found inside the challenge01 binary to find password candidates. Based on the results we looked into the assembly to find the correct password. In this post, we’ll
Publish At:2016-08-29 14:15 | Read:20285 | Comments:0 | Tags:Uncategorized radare2 reverse engineering tutorial


Share high-quality web security related articles with you:)


Tag Cloud