recentpopularlog in

whip_lash : assembly   45
Favorite tweet:

A Crash Course in x86 Assembly for Reverse Engineers : (pdf)

Reverse Engineering x86 Processor Microcode : (Slides)

— Binni Shah (@binitamshah) April 7, 2019
reverse-engineering  reverseengineering  assembly 
13 days ago by whip_lash
NASM Tutorial
This tutorial will show you how to write assembly language programs on the x86-64 architecture.
assembly  programming  tutorial  nasm  assembler  c 
6 weeks ago by whip_lash
Practical Symbolic Execution and SATisfiability Module Theories (SMT) 101
Finding bugs is hard, reverse engineering is hard. Constraint solvers are the heart of many program analysis techniques, and can aid Fuzzing, and software verification.

This post contains a few hands-on experiments with Z3, a high performance theorem prover developed at Microsoft Research by Leonardo de Moura and Nikolaj Bjorner. With KLEE, a Symbolic Execution Engine built on top of the LLVM compiler infrastructure developed by Cristian Cadar, Daniel Dunbar, and Dawson Engler. And, angr, a binary analysis framework developed by the Computer Security Lab at UC Santa Barbara and their associated CTF team, Shellphish.
ctf  assembly  exploit  development  reverse-engineering 
may 2018 by whip_lash
SizeCoding is a wiki dedicated to the art of creating very tiny programs for the 80x86 family of CPUs. By "very tiny programs", we mean programs that are 256 bytes or less in size, typically created by members of the demoscene as a show of programming skill. The size of these tiny programs is measured by their total size in opcode bytes, and are usually presented as executable .COM files to be run in pure DOS, a DOS VM running inside another operating system, or an emulator that can run DOS such as DOSBox.
assembly  coding 
april 2018 by whip_lash
Vulnerability Modeling with Binary Ninja | Trail of Bits Blog
Plenty of static analyzers can perform vulnerability discovery on source code, but what if you only have the binary? How can we model a vulnerability and then check a binary to see if it is vulnerable? The short answer: use Binary Ninja’s MLIL and SSA form. Together, they make it easy to build and solve a system of equations with a theorem prover that takes binaries and turns them, alchemy-like, into vulnerabilities!
assembly  binary  vulnerability  exploit 
april 2018 by whip_lash
Ring Ø Labs: Metasploit - Some Assembly Required
So, how do we fix this? We simply need to write a few lines of assembly to manually set up the stack in a way that prevents subsequent functions from overwriting our shellcode. To do this we need to subtract a value greater than 1024 bytes from the current ESP location and then set EBP to ESP. This moves ESP below our shellcode on the stack and ensures that it will not be altered.
assembly  metasploit 
march 2018 by whip_lash
A lightweight, online service for when you don’t have the time, resources, or requirements to use a heavier-weight alternative. Explore executables by dissecting its sections, strings, symbols, raw hex and machine level instructions.
assembly  disassembler 
january 2018 by whip_lash
Introduction to reverse engineering and Assembly. | KaKaRoTo's Blog
I’ve always said that reverse engineering and ASM is “too complicated to explain” or that “If you need help to get started, then you won’t be able to finish it on your own” and various other vague responses—I often wanted to explain to others why I said things like that but I never found a way to do it. You see, when something is complex, it’s easy to say that it’s complex, but it’s much harder to explain to people why it’s complex.
assembly  hacking  programming  reverseengineering 
january 2018 by whip_lash
VisUAL - A highly visual ARM emulator
VisUAL has been developed as a cross-platform tool to make learning ARM Assembly language easier. In addition to emulating a subset of the ARM UAL instruction set, it provides visualisations of key concepts unique to assembly language programming and therefore helps make programming ARM assembly more accessible.
It has been designed specifically to use as a teaching tool for the Introduction to Computer Architecture course taught at the Department of Electrical and Electronic Engineering of Imperial College London.
arm  assembly  emulator 
january 2018 by whip_lash
TCP Bind Shell in Assembly (ARM 32-bit) | Azeria Labs
After going through this tutorial, you will not only know how to write shellcode that binds a shell to a local port, but also how to write any shellcode for that matter. To go from bind shellcode to reverse shellcode is just about changing 1-2 functions, some parameters, but most of it is the same.
arm  shellcode  assembly 
january 2018 by whip_lash
"Reverse Engineering for Beginners" free book
Topics discussed: x86/x64, ARM/ARM64, MIPS, Java/JVM.

Topics touched: Oracle RDBMS, Itanium, copy-protection dongles, LD_PRELOAD, stack overflow, ELF, win32 PE file format, x86-64, critical sections, syscalls, TLS, position-independent code (PIC), profile-guided optimization, C++ STL, OpenMP, win32 SEH.
assembly  book  engineering  security  reverseengineering 
january 2018 by whip_lash
This book introduces the concepts of how computer hardware works from a programmer`s point of view. A programmer`s job is to design a sequence of instructions that will cause the hardware to perform operations that solve a problem. This book looks at these instructions by exploring how C/C++ language constructs are implemented at the instruction set architecture level.
assembly  arm  pi 
january 2018 by whip_lash
Dangers of the Decompiler | Ret2 Systems Blog
Decompilers are an impressive but imperfect technology. They operate on incomplete information and do their best to approximate for us humans. Malicious actors can (and will) leverage these asymmetries as a means of deception.

As the industry grows more reliant on the luxuries of today’s decompilers, the adoption of anti-decompilation techniques will increase and evolve in the same vein as anti-debugging and anti-reversing have.
assembly  decompiler  reverseengineering 
january 2018 by whip_lash
Home - Much Assembly Required
Much Assembly Required is a game where you can program your robot's microprocessor in x86-like assembly language in a procedurally generated universe
january 2018 by whip_lash
ILSpy is the open-source .NET assembly browser and decompiler.
dotnet  tools  decompiler  assembly 
august 2017 by whip_lash
A lightweight, online service for when you don’t have the time, resources, or requirements to use a heavier-weight alternative. Explore executables by dissecting its sections, strings, symbols, raw hex and machine level instructions.
assembly  web  disassemble  disassembler  reverse-engineering  tool 
december 2016 by whip_lash
Compiler Explorer
Translates c to assembly
c  c++  assembly 
february 2015 by whip_lash

Copy this bookmark:

to read