TransWikia.com
  1. All Categories
  2. Reverse Engineering

Reverse Engineering : Recent Questions and Answers (Page 21)

Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.

Is an ELF SHT_RELA section with a 0 `sh_link` valid?

I have an 64-bit s390x ELF binary with a RELA section named ".rela.plt" whose sh_link field is 0. I was under the impression that the sh_link is a required value,...

Asked on 05/01/2021 by John Källén

1 answer

Pe file code starting address

When i load an exe in the IDA the assembled code always starts at 00401000 address. Does it mean that in pe files the code always starts at that specific...

Asked on 05/01/2021 by Daros911

2 answer

how to use class member function defined in a exe within a dll

I have an executable (.exe) containing some classes and functions definition and plan on using those functions from within a DLL, although I know to call a regular C style...

Asked on 04/29/2021 by Dexter's

2 answer

ZTE AES-256-CBC Encrypted backup config file

i tried router pass view tool on (a closed source one) it's able to decrypt the older version of it V3.1. tested on two routers of it and it gave...

Asked on 04/28/2021 by MoooonX

0 answer

Reverse Engineering a Firmware. Someone can help me?

I am currently trying to reverse-engineer a firmware file to learn the topic but I am a little bit stuck. I tried to use binwalk to get more information about...

Asked on 04/27/2021 by wawouille

1 answer

How to retrieve the encryption key from a dll file?

I have a dll file that makes an http post request to a webserver , request looks something like this :UmdUsFrEB3wGMuuAz1Znywuedx6+ee9cHDyzqM3Gc0FW8TxKFitPfkoC23aJeW39rPhAIpkg7vyzYzRwsloEfUM3y1LnehrJVR5tQuoZ8EUa6uFgzFauuaiP1Ea9+lRg5OUi am not much of an expert but to...

Asked on 04/27/2021 by Sanders

0 answer

Local KD -- can't access physical address 0xFFFFFFF0 but you can with RwEverything

I've never been able to access 0xf0000000 range using !db on local debug, and I've tried !db -m 00000000`fffffff0 and !db [uc] 00000000`fffffff0. I only get Physical memory read at...

Asked on 04/26/2021

0 answer

How to extract the kernel assembly code from a zImage?

here is the situation, i have a OnePlus phone and i want to explore his kernel, so i downloaded the zip firmware from the oneplus website, extract the img files...

Asked on 04/26/2021 by BtPython

1 answer

Compare ELF files using Ghidra+Bindiff based on dwarf debug info

So this is a question not strictly about reverse engineering, but since there are many people using Ghidra and Bindiff here I'll try asking anyway. I have an embedded ARM...

Asked on 04/26/2021 by Daniel Näslund

0 answer

Disassemble scanf storage register

I am trying to understand scanf function a have 3 question regarding it.this is c file:#include <stdio.h>#include <stdlib.h>int main(){ int x; printf("Enter...

Asked on 04/24/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP