halis duraki
/
security rep+
/
consulting
/
blog
/
~ notes
Search site
- 0xduraki
Reverse Engineering Tricks and Tips
Find threads by patching a jump with a short jump (EB FE) to create an endless loop you can then search for
Looking for “CO A8” to find local IP addr prefix (192.168)
Looking for 4-byte Unix timestamps in hex in a file format or a network packet
Search/google all application constant values, classes and libraries
Resize Hex Editor window to identify unknown structures and its sizes
Check application Log messages and Xref them
Replace all
https
calls with
http
(instead of hooking on each TLS thread and decrypting SSL)
Using LD_PRELOAD to disable specific functions or patching binaries on the fly
Use Burp +
mitm_relay
to proxy traffic
Decompile JAR and attack via Frida,
Byteman
or any other dynamic instrumentation toolkit
Use dotPeek to identify and process attack surface for anything .NET based
Use
bingrep
to search for strings through binaries in all OSs/Arches (
brew install bingrep
)
Reverse Engineering Tricks and Tips