Skip to main content

All Questions

-1votes
1answer
966views

What can I do with reverse engineering

I have come across a lot of guides and blogs about reverse engineering where they use labs to teach various techniques and methods to break binaries. My question is what actual use cases does reverse ...
Abhinav Vasisth's user avatar
3votes
1answer
214views

Running a brief asm script inline for dynamic analysis

Is there any good reason not to run a brief unknown (30 line) assembly script inline in a usermode c program for dynamic analysis directly on my laptop? There's only one system call to time, and at ...
comp.sci.intern's user avatar
-1votes
1answer
298views

What tools exist to crack, disable, and undo the effects of a malicious Linux binary? [closed]

I'm a network Penetration Tester and I'm trying to learn how to crack binaries. As an exercise, I've spent two days trying to crack a Linux binary that was supposedly designed to be cracked. ...
user7451333's user avatar
6votes
1answer
8kviews

Difference Between Binary Exploitation and Reverse Engineering?

I am a beginner in Reverse Engineering and am trying to improve my skill by participating in any CTF's I can and solving CrackMe's. I am trying to find out why Binary Exploitation and Reverse ...
bi0s.kidd0's user avatar
19votes
7answers
14kviews

Any comprehensive solutions for binary code protection and anti-reverse-engineering? [closed]

Does anyone know of good products with comprehensive binary hardening and anti-reverse-engineering features? Or better, has anyone seen an independent review comparing products that perform these ...
Weber's user avatar
  • 1,014

close