During April I challenged myself to tweet 1 reverse engineering tip every day. For your viewing pleasure, here I aggregated all 30 tips.
When reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. A dll (Dynamic Linked Library) with our target function would allow us to conveniently review and test the function as we wish. The only problem is that usually the function we want to examine resides in an exe, not a dll. Converting an exe to a dll is a doable. After all, both an exe and a dll share the same PE file format.
With the world in quarantine and isolation because of COVID-19, I decided to publish a blog post reminding us of more cheerful times.
Take yourself back to the last time you spent weeks hammering away at a seemingly impossible challenge, and quickly fast-forward to when you finished that problem.
Do you remember your intense excitement and satisfaction? How did you celebrate your success?
A reference for when working with integers, and looking for integer overflows and underflows.
Many of us take for granted ls’s convenient display, and probably didn’t ever stop to consider how it even knows which colors to use for which files. This very question sparked my curiosity and lead me to researching the internals of this mechanism.