|
You are here |
cronop-io.github.io | ||
| | | | |
blog.nuculabs.dev
|
|
| | | | | I've recently finished reading a book called Practical Binary Analysis which I consider a state of the art book (review will come soon) and I would like to post my solution to the crackme found in chapter 5. | |
| | | | |
mdanilor.github.io
|
|
| | | | | What features are in place to protect your system from memory corruption? And how to bypass them? | |
| | | | |
gebir.ge
|
|
| | | | | [AI summary] The article discusses two methods for modifying the behavior of the `strcmp` function in a program. The first method involves directly patching the binary to change the conditional jump instruction that determines the return value. The second method uses `LD_PRELOAD` to override the `strcmp` function with a custom implementation that inverts the return value of the original function. Both approaches aim to correct the program's incorrect handling of string comparison by reversing the logic of the return value. | |
| | | | |
goggleheadedhacker.com
|
|
| | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | ||