[ad] As far as I know this has been happening for some time, sometimes a patch comes out for a vulnerability that many people don’t know about (including the hackers) so they will see what problem the patch fixes (possibly through reverse engineering) then develop an exploit to leverage on the flaw. It seems things […]
reverse-engineering
Hackers Could Become The Hacked?
[ad] It looks like someone is going after the bad guys in a new way, by hacking them back! It’s no news to us that many hacking tools and script kiddy trojan kits are badly programmed..a lot of them have back-doors and the client-side tools have easy exploits that enable you to take over the […]
Why Blurring or Mosaicing Important Information is a BAD Idea
[ad] I saw a pretty interesting article a few days attempting to reverse engineer the mosaic tool used often online to obscure sensitive or confidential information. The article shows that the mosaic isn’t actually very random, and in a way you can brute force reverse engineer the mosaic to reveal the contents before they were […]
Linux Reverse Engineering Hacker Challenge
[ad] The first round results of the Linux Reverse Engineering Hacker Challenge are out! http://www.hackerchallenge.org It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first […]
What Responsibility do Anti-Spyware Researchers Have?
[ad] Ethical debates are always interesting, and people have gotten in trouble lately for reverse engineering and various other branches of research. This is a fairly old topic, but as I’m clearing out some old drafts, I still find it an interesting one. There’s been an ongoing debate in security circles concerning how security researchers […]