TransWikia.com
  1. All Categories
  2. Reverse Engineering

Reverse Engineering : Recent Questions and Answers (Page 28)

Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.

IDA plugin with visual studio c++ 2019

Hello all and sorry for my bad English I am trying to test an example for developping plugin in C++ with IDA from the book : http://www.binarypool.com/idapluginwriting/idapw.pdf...

Asked on 03/02/2021

2 answer

Bypassing debugger detection in radar2

I'm currently doing a reversee engineering challenge. I disassembled the ELF binary in radare2, however the binary checks whether its attached to a debugger. How can i bypass this detection...

Asked on 03/01/2021 by Garde Des Ombres

0 answer

Patching PLT entries

I was reading this CTF write up and wanted to know more than the author cared to explain. I actually just patched the PLT entries of getenv(), ptrace()...

Asked on 02/27/2021 by movecx

3 answer

Decoding New Jersey Driver's License Codes

Driver's License numbers in New Jersey aren't random. They follow the format: Affff lllii mmyye, where A is the first letter of the person's last name, ffff...

Asked on 02/26/2021 by Alex Beals

6 answer

Symbols for detecting UBSan

I am looking for the symbols that reveal if a specific binary was compiled with UBSan.Unfortunately, Checksec is not able to detect it....

Asked on 02/26/2021 by packmad

0 answer

Arrays assembly

I'm reversing my C array's programs where I'm storing numbers in arrays like this...int marks[5];marks[0] = 1;marks[1] = 3;marks[2] = 2;marks[3] = 7;marks[4] = 9;so the compiler showing me...

Asked on 02/25/2021 by Ramesses II

1 answer

How to 'hack' the chat box in an online game

First and foremost, this is really just a UI hack, nothing that would give you an unfair advantage over an opponent. I play an online game that is predominately...

Asked on 02/25/2021 by FraserOfSmeg

2 answer

Accessing Call String of CALLOTHER Pcode Instruction via Java API?

Is there a way to access the call string of a CALLOTHER Pcode instruction when iterating over the Pcode in Java? The listing below shows an example of what I...

Asked on 02/25/2021

1 answer

How to dump heap from packed program (unpack asprotect)

I have a packed program. I have found the oep of the program but the problem is every call to the system dll like kernel32, user32, ... change to a...

Asked on 02/22/2021 by haxerl

0 answer

Call of a suspicious method cannot be found

i have a strange apk which I took a closer look at, among others with jadx-gui. It is a gaming app that requires an unusual amount of permissions according to...

Asked on 02/20/2021 by fellower4

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP