Find answers to your questions about Reverse Engineering or help others by answering their Reverse Engineering questions.
I have a collection of different binaries I want to review for code similarity and classification, but I would rather not have to open each of them in IDA and...
Asked on 08/23/2020 by solumnant
1 answerI am trying to develop a machine learning model to help with the process of reverse engineering. As the first stage, we are currently trying to train an embedding model...
Asked on 08/21/2020 by hEShaN
1 answerELF x64 binary on a remote server communicates via simple socket server in C. After overflowing the buffer (total buffer is 2000, password buffer is less), overwriting the RIP, filling...
Asked on 08/20/2020 by i.e.
1 answerI have a simple program:#include <stdio.h>int main(){ int a; a = func(15, 3); return a;}int func(int i, int j){ int b1[5], b2[10]; b2[i] =...
Asked on 08/08/2020
1 answerA binary I am studying puts the this pointer in rcx, followed by the rest of its arguments as its default convention. For some reason, IDA defaults to fastcall, but...
Asked on 07/31/2020 by Pororo
0 answerI Was wondering What are all the possible ways people can mess with the executable's .rdata Strings ? Because I've actualy seen it .. But i do not have any...
Asked on 07/24/2020 by 0 x 5 4 4 D
0 answerIm trying the phoenix vm, challenge stack-five on exploit.education (http://exploit.education/phoenix/stack-five/).I run onto a problem while exploiting a stack overflow. The challenge is run execve('/bin/sh') through shellcode....
Asked on 07/23/2020 by Burst
0 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP