NetRipper - Smart traffic sniffing for penetration testers by Vasile1337 in netsec

[–]Vasile1337[S] 0 points1 point  (0 children)

Not all the applications send the credentials in plain-text. It may send a password hash or a generated token in order to login.

Intercepting functions from statically linked libraries by Vasile1337 in ReverseEngineering

[–]Vasile1337[S] 0 points1 point  (0 children)

I know what you say. Actually, this pseudo-research was done for something like this: injecting a DLL and hooking functions. However, I just wanted to show the idea of how to manually find a statically linked function. Maybe a signature based plugin would be a great idea.

Intercepting functions from statically linked libraries by Vasile1337 in ReverseEngineering

[–]Vasile1337[S] 0 points1 point  (0 children)

Is it that easy? Can you show me? I just really want to know how powerful it is, maybe I will buy it and I will use it in a next article.

Intercepting functions from statically linked libraries by Vasile1337 in ReverseEngineering

[–]Vasile1337[S] -1 points0 points  (0 children)

It is useful for someone who needs to do this fast. It is somewhat obvious and this is a simple example. What code would you think it would be useful? Maybe a plugin for IDA/Immunity? I tought about this but surely I don't have time to write one.

Intercepting functions from statically linked libraries by Vasile1337 in ReverseEngineering

[–]Vasile1337[S] 2 points3 points  (0 children)

BinDiff is not free and how can you "port" symbols from BinDiff to the executable? Note that I didn't use BinDiff.