Today in this part of the course we will reverse a program to recover passwords in RAR files. https://download.cnet.com/RecoverPassword-Rar-Password-Recover/3000-18501_4-78328724.html The program is in .NET therefore we will not have to see assembly language, it will be much easier. When we open the program we see a tab that indicates if we want to register the program we click, and now we shoul..
Index of course: Basics of reverse engineering. Binary patching of real-world software. Backdoors. Testing software for vulnerability research. Exploit development. Basics of reverse engineering Reversing, is to find out from a «product» that its inverse process is finished. In the case of computer science from a binary or software know its source code, interpreting the high level language that ..
The purpose of this course is to teach a cyclic procedure to do reverse engineering and backdoors malware patching in modern real software by modifying the code using assembly language. The opportunities that one program or another can offer us depend on the protections that the program has and its functionality. Also it is importat the persistence in Windows system for Red Team purpose. The mai..
- Total
- Today
- Yesterday
- leak stack memory address
- cracking
- write primitive
- one gadget
- shellcode
- pwnable.tw
- hijacking redirection flow
- canary
- Windows
- 32Bit
- format string
- Backdoors
- dnspy
- theFaunia course
- x64dbg
- open-redirect
- fake stack frame
- stack pivot
- html injection
- Call oriented programming
- XSS
- leak libc
- ASM
- pwnable.xyz
- GOT Dereferencing/Overwriting
- use after free
- Pwnable.kr
- return oriented programming
- buffer overflow
- arithmetic overflow/underflow
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |