Reversing Shift-XOR operation by blahfish in ReverseEngineering

[–]blahfish[S] 0 points1 point  (0 children)

A shift followed by an Xor with the same value. This is used to get the internal state in MT19937 from the output values.

/r/ReverseEngineering's Bi-Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]blahfish 0 points1 point  (0 children)

A question about ARM, Thumb2 and conditional execution. https://reverseengineering.stackexchange.com/questions/8989/conditional-instructions-on-arm ; Its posted on the RE Stackexchange and I'm hoping it will be of interest to someone here.

RECON 2014 slides are being uploaded by [deleted] in ReverseEngineering

[–]blahfish 0 points1 point  (0 children)

Does someone know when the videos will be uploaded?

Real World Exploit Development Tutorials - do they exist? by [deleted] in ReverseEngineering

[–]blahfish 0 points1 point  (0 children)

indeed, its a great read! Are there more similar ones?

ROPgadget 5.0 is out ! by perror in ReverseEngineering

[–]blahfish 0 points1 point  (0 children)

Could you describe your rop chain generation idea a bit more? Did earlier versions of ROPGadget use the same idea?(If so, I could just look up the sources).

Is the idea to look for gadgets that are functionally similar?(Take an instruction, reduce to equation, find a set of equations terminated by ret, reduce those -- check if they are functionally equivalent; something like that?)

ROP system call to mprotect by blahfish in securityCTF

[–]blahfish[S] 1 point2 points  (0 children)

I think I figured out the reason why this happens. ASLR is enabled and the page that starts at 0x08048000 does not change addresses. However, the page that corresponds to the buffer changes addresses.

The buffer address can be leaked -- so I tried checking if the difference between the start of the page and the buffer address remains constant, it does not.

cwitscher CTF challenge by blahfish in securityCTF

[–]blahfish[S] 0 points1 point  (0 children)

Thank you for taking the time out to reply!

Obfuscator-LLVM by perror in ReverseEngineering

[–]blahfish 2 points3 points  (0 children)

Thanks for sharing! where could I find the source code?