The first round results of the Linux Reverse Engineering Hacker Challenge are out! http://www.hackerchallenge.org It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first Hacker […]
Tag Archive | "reverse-engineering"
Ethical debates are always interesting, and people have gotten in trouble lately for reverse engineering and various other branches of research. This is a fairly old topic, but as I’m clearing out some old drafts, I still find it an interesting one. There’s been an ongoing debate in security circles concerning how security researchers should […]
The eEye Binary Diffing Suite (EBDS) is a free and open source set of utilities for performing automated binary differential analysis. This becomes very useful for reverse engineering patches as well as program updates. The first tool is BDS, the Binary Diffing Starter from Andre Derek Protas. This tool helps reverse engineers with batch-analysis of […]
The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. Why is it ‘Universal’? There are different ways of hooking functions in a program, for example, it can be done by setting […]
This could be the end of reverse engineering in France sadly, I hope it doesn’t have repucussions in other parts of the world. I think it’s the end of using reverse engineering tools to find flaws in France. Maybe the next step will be to forbid the possession of debuggers and disassemblers. It’s a valid […]
Popular Tagscomputer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·