Skip to content
  • Last call.

    Uncategorized reverseengineer
    1
    1
    0 Votes
    1 Posts
    0 Views
    recon@infosec.exchangeR
    Last call. REcon 2026 CFP deadline is April 11. Deep technical content, reverse engineering, exploitation research. https://recon.cx/2026/en/cfp.html #reverseengineering
  • 0 Votes
    22 Posts
    0 Views
    infosecdj@infosec.exchangeI
    @azonenberg The same ROI on metal1. Just as mysterious.
  • 0 Votes
    3 Posts
    0 Views
    infosecdj@infosec.exchangeI
    A detail view on the analog section; the features on the right seem to be four resistor arrays of the same value, and those on the left are multiple capacitors connected in parallel. I wonder why they decided to make multiple separate parts instead of making a large one of required geometry.
  • 0 Votes
    3 Posts
    0 Views
    bluedevil@infosec.exchangeB
    @buherator OMG, yes yes, why? Instead we get a ph** a** dump file. Arghh...
  • 0 Votes
    19 Posts
    0 Views
    purpleidea@mastodon.socialP
    @Harpocrates Great work! If you have the reach (signal org has ignored my questions) please get them to release all of their infra automation code!They've build a substantial amount of infrastructure and that should be open source so that someone could replicate the network easily if for some reason we were forced to!
  • 0 Votes
    1 Posts
    0 Views
    bluedevil@infosec.exchangeB
    A very detailed tutorial from "Joaquin Pinillos"Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes. https://github.com/jazho76/page_table_walk#reverseengineering #linux #ctf
  • 0 Votes
    1 Posts
    0 Views
    H
    Announcing a Major Architectural Update to RIFT RIFT has undergone a complete rearchitecture to enhance its modularity, extensibility, and usability. An experimental build has been released on our GitHub repository, while the stable build remains available. The experimental build will continue to receive updates and improvements over time. What is RIFT?RIFT is a valuable tool for reverse engineers, designed to generate on-demand FLIRT signatures for Rust binaries. What's new?️ Three Operation Modes: - File Analysis Mode: Point RIFT directly at a binary. - Direct Generation Mode: Target specific crate versions and compiler combinations. - HTTP API Server Mode: Run RIFT as a service with an async job queue. Modernized Ida Pro Plugin: The Ida Plugin has been rebuilt with server integration, enabling FLIRT signature generation while reversing without needing to leave the window.For more details, visit: https://github.com/microsoft/RIFT#reverseengineering #malware #rift #infosec #opensource #binaryanalysis
  • 0 Votes
    1 Posts
    0 Views
    infosecdj@infosec.exchangeI
    Hello, wonderful people. Taking a break is good, so I am taking a couple moments to write the #nakeddiefriday post of the week.Today we have this interesting sample. Yes, it has certainly seen better days; been sitting in a queue for a real while now. This is again a smartcard chip without a name to it. I believe this to be fabbed by Samsung, and be rather old. The chip is built using poly-gate CMOS with 3 metal layers; later processes moved to a higher layer count.#electronics #smartcards #reverseengineering
  • 0 Votes
    9 Posts
    1 Views
    lumiya@lgbtqia.spaceL
    @poleguy @jaseg Yea I think I'll try that.There is no button it's based on infrared. But I'll take a look and see what I find out with the tips and tools.Also I think I see it partially as an exercise