11 links tagged with all of: reverse-engineering + security
Click any tag below to further narrow down your results
Links
The article details a reverse engineering project on the TP-Link Tapo C200 camera, revealing multiple security vulnerabilities. The author used AI tools to assist in the analysis, uncovering issues like a memory overflow and an unauthenticated WiFi hijacking exploit that could compromise user privacy.
This article explores the use of AI models, particularly Claude Opus 4.6, to detect hidden backdoors in binary executables. While some success was noted, with a 49% detection rate for obvious backdoors, the approach remains unreliable for production use due to high false positives and limitations in analyzing complex binaries.
This article analyzes the methods used by ring-1.io, a cheat provider for online games, focusing on its evasion tactics and bootloader implant. The author details the reverse engineering process, examining how the cheat interacts with UEFI firmware and Hyper-V to avoid detection.
This article breaks down the security architecture of macOS on Apple Silicon, focusing on the immutable Boot ROM and its role in establishing a Chain of Trust. It details how the Boot ROM initializes the system, loads the Low-Level Bootloader, and enforces code integrity through hardware mechanisms like the Public Key Accelerator.
The article details the author's experience using AI, specifically Claude Opus 4.5, to reverse engineer and intercept network traffic from the Cronometer app, built with Flutter. It covers challenges related to SSL pinning and proxy routing, and how AI-assisted debugging streamlined the process.
The author details their experience with an Ãike electric scooter after the company went bankrupt, leading to concerns over app functionality. They reverse engineer the scooter's app to regain control, uncovering security flaws and the complexities of its communication with the scooter via Bluetooth.
The article explores techniques and tools for reverse-engineering modern web browsers, focusing on the intricacies of browser architecture, security mechanisms, and debugging processes. It highlights the importance of understanding browser internals for both security researchers and developers aiming to enhance their web applications. Practical examples and methodologies are provided to aid in the reverse-engineering process.
The blog discusses PatchGuard, or Kernel Patch Protection (KPP), a critical security feature in Windows that protects the kernel from unauthorized modifications. It explains how PatchGuard operates asynchronously to monitor key kernel structures, triggers a blue screen of death (BSOD) upon detecting tampering, and delves into its initialization process and the challenges of reverse engineering it. Additionally, the article hints at potential bypasses for this security mechanism.
Apple released a security patch for CVE-2025-43300, addressing an out-of-bounds write vulnerability in the ImageIO framework that could be exploited in zero-click attacks. The article provides a detailed root cause analysis of the vulnerability and the changes made in the patch, focusing on the modifications in the RawCamera file and the implications for image processing. Researchers have previously explored the vulnerability, revealing its connections to JPEG Lossless compression in DNG files.
RIFT (Rust Interactive Function Tool) is a suite designed to aid reverse engineers in analyzing Rust malware, consisting of an IDA plugin static analyzer, a generator for creating signatures, and a diff applier for applying binary diffing results. It is crucial to use RIFT within a secure virtual machine environment to avoid security risks, and the tools are primarily tested on Windows and Linux systems. Community contributions are encouraged to enhance the tool's capabilities.
Automated Function ID database generation in Ghidra streamlines the reverse engineering process for binaries lacking symbol information by allowing analysts to create and apply function signatures. The article discusses utilizing scripts and PowerShell to extract object files from static libraries, import them into Ghidra, and generate function signatures, enhancing the clarity and efficiency of vulnerability analysis in software.