-
Recent Posts
- Build nwjs12 for windows
- Deobfuscate Javascript using PhantomJS (Headless browser)
- Angler Exploit kit breaks Referer chain using HTTPS to HTTP redirection
- Instrument Microsoft Office applications to defeat macro obfuscations
- Dealing with pcaps in windows using Fiddler/FiddlerCore
- Extend Sulo to find the CVE of Flash exploits
- Understanding CVE-2015-0310 Flash vulnerability
- Build and use PCRE in windows
Top Clicks
- None
May 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Join 54 other subscribers
Category Archives: Binary Auditing
IDA Toolbag by Aaron Portnoy
Those who are in the reversing field should try this. https://github.com/aaronportnoy/toolbag
String manipulation functions in Glibc, MS Visual Studio and 0x7efefeff, 0x81010100, 0x81010101
Recently i got a chance to read a blog(first link in https://hiddencodes.wordpress.com/2011/12/20/bug-hunting-to-exploit-log/) about finding vulnerability. He given a tip on finding the string manipulation functions in the binary. It was quite new to me so i started to look into … Continue reading
Bug Hunting to exploit – Log
Today i got a chance to read a blog on Bug hunting to exploit. It was a quite interesting read. I am going list down few of such interesting read in this blog post. http://www.skullsecurity.org/blog/2011/remote-control-manager-fail http://dvlabs.tippingpoint.com/blog/2010/09/01/zdi-10-169-on-exploitability
Posted in Binary Auditing, IDA Pro, Reversing
Tagged Bug Hunting, Bug to an exploit, Convert to an exploit, Source Code Auditing
1 Comment
Basic Binary Auditing (step 1)
When we analyse the source code for vulnerabilities, it takes lot of time to find the sign extension issues and other related issues. But binary point it out very clearly. What i usually do is, i download the source code … Continue reading