- Find threads by patching a jump with a short jump (EB FE) to create an endless loop you can then search for
- Looking for “CO A8” to find local IP addr prefix (192.168)
- Looking for 4-byte Unix timestamps in hex in a file format or a network packet
- Search/google all application constant values, classes and libraries
- Resize Hex Editor window to identify unknown structures and its sizes
- Check application Log messages and Xref them
- Replace all
https
calls with http
(instead of hooking on each TLS thread and decrypting SSL) - Using LD_PRELOAD to disable specific functions or patching binaries on the fly
- Use Burp +
mitm_relay
to proxy traffic - Decompile JAR and attack via Frida, Byteman or any other dynamic instrumentation toolkit
- Use dotPeek to identify and process attack surface for anything .NET based
- Use bingrep to search for strings through binaries in all OSs/Arches (
brew install bingrep
)
Reverse Engineering Tricks and Tips