Reversing: Secrets of Reverse Engineering

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more […]

Bytecode Viewer – A Java 8 Jar & Android Apk Reverse Engineering Suite

Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX Decompiler, GUI Procyon Java Decompiler, GUI Krakatau, GUI CFR Java Decompiler, GUI FernFlower Java Decompiler, GUI DEX2Jar, GUI Jar2DEX, GUI Jar-Jar, Hex Viewer, Code Searcher, […]

Malwasm – Tool For Malware Reverse Engineers

Malwasm is a Cuckoo Sandbox based open source tool that is designed to help malware reverse engineering tasks. How Malwasm Works: The malware to analyse is executed through Cuckoo Sandbox. During the execution, Malwasm logs all activities of the malware with pintool. All activities are stored in a database (Postgres). A web service is available […]

Black Rabbit – Python Cross-Compiled Reverse Shell for Windows

Black Rabbit – Python Cross-Compiled Reverse Shell for Windows Installation apt-get install wine git clone https://github.com/m4n3dw0lf/blackrabbit.git Usage #Edit the Master host informations: #brshell.py host = ‘10.0.0.1’ port = 1337 #Build the Cross-Compiled .exe for Windows: python setup/cross-compiler.py brshell.py . . . 2717 INFO: Building EXE from out00-EXE.toc completed successfully. [!] Done, brshell.exe trojan inside ‘dist/’ […]

Installing Apktool for Reverse Engineering Android Apps

Apktool is used for reverse engineering 3rd party Android apps. Debugging is made easier with Apktool’s ability to decrypt properties to their practically original forms. By rebuilding the properties post alteration, a user can gradually debug a smali code. Kali lists the features of apktool: decoding resources to nearly original form (including resources.arsc, XMLs and […]

rePy2exe – A Reverse Engineering Tool for py2exe applications

Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.py or python2.7 rePy2exe.py Authors Alisson Moretto – Coder – 4w4k3 Reference Thanks to: zrax – pycdc matiasb – unpy2exe License This project is licensed under the GPL 3.0 License – see the LICENSE file for details.

rePy2exe – Reverse Engineering Tool For py2exe Applications

rePy2exe, a Reverse Engineering Tool for py2exe applications.   cmake git python 2.7 Enter the following command to download rePy2exe file git clone https://github.com/4w4k3/rePy2exe.git   Now to run rePy2exe type python rePy2exe.py python2.7 rePy2exe.py Download now –  rePy2exe

Lobotomy – Android Reverse Engineering Tool

Lobotomy is a command line based Android reverse engineering tool.   Components: Permission Strings Attack Surface Surgical Interact UI De-compile De-buggable Dextra Socket   OSX Components required for python-adb brew install openssl   brew install swig   env LDFLAGS=”-L$(brew –prefix openssl)/lib” CFLAGS=”-I$(brew –prefix openssl)/include” SWIG_FEATURES=”-cpperraswarn -includeall -I$(brew –prefix openssl)/include”   Now enter the following code […]

Hack any Mobile APP – Reverse engineering and Analysis Framework.

MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering tools, in order to make the task or reverse engineering and analysis easier and friendly to mobile application developers and security professionals. Features supported Reverse engineer apk files to smali, java jar […]

Reverse-engineering DUBNIUM’s Flash-targeting exploit

The DUBNIUM campaign in December involved one exploit in-the-wild that affected Adobe Flash Player. In this blog, we’re going to examine the technical details of the exploit that targeted vulnerability CVE-2015-8651. For more details on this vulnerability, see Adobe Security Bulletin APSB16-01. Note that Microsoft Edge on Windows 10 was protected from this attack due […]

Push To Hack: Reverse engineering an IP camera

For our most recent IoT adventure, we’ve examined an outdoor cloud security camera which like many devices of its generation a) has an associated mobile app b) is quick to setup and c) presents new security threats to your network. The Motorola Focus 73 outdoor security camera is packed with features and quite a few […]

How to do malware reverse engineering

Malicious Software can be Virus, Worm, Trojan Horse, Rootkit, Bot, DoS Tool,Exploit kit, Spyware. The objective of malware analysis is to gain an understanding of how specific pieces of malware work. There are important questions that must be answered. Like, how did this machine become infected and what exactly does this malware do? In this […]

SideDoor – Debian/Ubuntu Backdoor Using A Reverse SSH Tunnel

Sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT. Sidedoor is packaged for Debian-based systems with systemd or upstart. It has been used on Debian 8 (jessie) and Ubuntu 14.04 LTS (trusty). The sidedoor user has full root access configured in /etc/sudoers.d. If […]

Reverse Engineering Tool – BinText

A small, very fast and powerful text extractor.It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item. Basically, we need to extract the appropriate text that will lead us back to the hacker. […]

Criminals Steal $4 Million In Cash With Novel ‘Reverse ATM’ Attack

Over the last year, criminals in Russia found a way to steal 252 million Rubles ($3.8 million) from five unnamed banks, using a novel technique called a “reverse ATM attack”, according to Russian digital intelligence firm Group-IB. It exploited esoteric weaknesses in the international transfer system and involved compromised point-of-sale systems in America as well as a […]

Reverse-Engineering iOS Apps: Hacking on Lyft

If you’ve ever needed to know how another piece of code works, or have been at the mercy of someone else’s bugs, you can always look at the source code… unless you don’t have it. In this talk, Conrad covers many concepts & tools that can used to reverse-engineer existing apps, as well as debug […]

Reverse Skype Resolver (How-to)

A Resolver will “lookup” a username on a VPS hosting the hacked skype, which allows the skype to pull data from the debug files. It does not need to call you, or add or even message you. It is a simple debug file on all computers/mobiles. Step 1: Install the latest version of Skype >>>Download […]

Carr’s Four Cyber Trends That Must Be Reversed Now

I’m not always in alignment with Jeffrey Carr’s point of view but in this he is spot on. Succinct and to the point, Jeffrey Carr addresses cybercrime, cyberwarfare rules of engagement and forecasts the United States’ rapid decline: Should these trends continue unabated, we will have no one to blame but ourselves as the economical