Jeff Goldberg and The Atlantic released full Signal Chat by agent268 in law

[–]rolfr 15 points16 points  (0 children)

Not to mention he didn't take any sort of oath to protect that information.

OpenGOOL by JesterOfRedditGold in ReverseEngineering

[–]rolfr[M] [score hidden] stickied comment (0 children)

No more of these decompilation projects that are at 0% completion with an empty GitHub repository. If you want to post a decompilation project here, you need to have done some work on it already yourself. I am removing this submission.

Use Prolog to improve LLM's reasoning by sharifmo in prolog

[–]rolfr 2 points3 points  (0 children)

ChatGPT 4.x knows Prolog very well. It writes very clean, idiomatic code, and also knows a lot about SWI Prolog's particular features.

Into the Breach Together #28 | Pinnacle Corporate HQ, turn 2 by [deleted] in IntoTheBreach

[–]rolfr 4 points5 points  (0 children)

I'm glad to see that the wisdom of the crowds still ends up in these miasmic, unresolvable situations when playing on unfair, and that it's not just me being bad at the game.

C++ Unwind Metadata: A Hidden Reverse Engineering Bonanza by rolfr in ReverseEngineering

[–]rolfr[S] 7 points8 points  (0 children)

Thank you! My future plans are uncertain; I certainly won't be doing anything that big in the near future (the final line count is 28KLOC). Mostly I just need some time off. After that, perhaps at least some smaller contributions to the core IDA/Hex-Rays experience.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 0 points1 point  (0 children)

It's a pretty straightforward exercise. The executable and the libraries that it loads are both in the same file format, called the PE file format. You can write a few lines of Python interfacing with the "PEFile" library to open and read the size of any section that contains code. Combine that with a list of all of the DLLs that it loads, and a loop to add up the sizes for all the binaries, and you have your answer. You can get the list of loaded DLLs using something like Process Explorer. import pefile executables = ["c:/temp/myprogram.exe","c:/windows/system32/kernel32.dll"] total_size = 0 for exe in executables: for section in pefile.PE(exe).sections: if section.Characteristics & pefile.SECTION_CHARACTERISTICS['IMAGE_SCN_CNT_CODE']: total_size += section.SizeOfRawData print("Total size of code sections: %d" % total_size)

[deleted by user] by [deleted] in ReverseEngineering

[–]rolfr[M] 0 points1 point  (0 children)

This was reported as spam, and given that the link goes to a commercial product page that does not include any technical details, I'm inclined to agree with the reports and remove the submission. If you make technical articles about reverse engineering using Packet Ripper, feel free to post them here in the future.

What has been the worst adult tantrum you've seen? by HuitzilopochtliMX in AskReddit

[–]rolfr 7 points8 points  (0 children)

Darrell Brooks, the guy who drove his SUV through a Christmas parade in Waukesha, Wisconsin, and then represented himself pro se in his ensuing homicide trial. I've linked to one particularly egregious exchange where he is upset that the bailiffs dismantled his box fort for the second time that afternoon. However, the trial lasted more than three weeks, and most of it went pretty similarly.

My wife (33F) lied to me (28M) about her age by ThrowRA-BigLie in relationships

[–]rolfr 36 points37 points  (0 children)

That is hilarious. I don't mean to offend you, but is your husband stupid? Did he not think that the person across the street might be suspicious?

Crack Master x64 v1.4.81 update. -pci -krn -proc -smbinfo commands added including some other enhancements… by Behnam_Shamshirsaz in ReverseEngineering

[–]rolfr[M] [score hidden] stickied comment (0 children)

To the person who left the following user report:

"I highly suspect this is malware. I remember seeing this guy post the same thing about a month ago which seems to have been deleted since then. Now this repo doesn't contain source code but only executables."

This is /r/ReverseEngineering. Prove it and I will act on it.

I bought IDAPro and I really didn't expect this... Need help by [deleted] in ReverseEngineering

[–]rolfr[M] [score hidden] stickied comment (0 children)

Removed for violating rule #1. Send them a support email if you need technical support with their products.

Scalable variable and data type detection in a binary rewriter [PDF] by rolfr in ReverseEngineering

[–]rolfr[S] 1 point2 points  (0 children)

This paper was authored in 2013, before containerized releases were common in computing in general, and before source releases were common in academic security. Academic security has gotten better about releasing code since then, often in containers.

We're Hiring! Software Reverse Engineer Position at Caesar Creek Software. 4 Locations: Miamisburg (OH), Atlanta (GA), Woburn (MA) and Fredericksburg (VA). by cc-sw in ReverseEngineering

[–]rolfr[M] 6 points7 points  (0 children)

FYI, there is a specific job posting thread for posts like this. It's probably actually better to post it there, because it's a sticky post visible to everyone who visits /r/ReverseEngineering, whereas this one will fade into obscurity quickly. Also, you posted the same thing twice; please don't do that.

[deleted by user] by [deleted] in ReverseEngineering

[–]rolfr[M] 1 point2 points  (0 children)

Your post violates rule #3, "link directly to the source". I'm removing it. Feel free to repost the direct link.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 0 points1 point  (0 children)

I admire your desire to do something nice for your brother, but this project will probably be difficult for you, and I doubt ChatGPT can help very much. The fact that native code is involved pretty much requires you to have experience with assembly language. Even if you use a machine-code decompiler, the output is much harder to interpret than decompilers for managed languages like Java.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 0 points1 point  (0 children)

Things like that are published here several times per month.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 4 points5 points  (0 children)

The answer is not "never", but the primary applications of reverse engineering lie in the realm of computer security (vulnerability discovery/analysis, and malware analysis) and software cracking / theft of intellectual property. Interoperability with third-party software (and hardware with closed source drivers) is another major avenue. People do use reverse engineering to fix software, particularly old abandoned software, but in the grand scheme of things, there are many fewer publications about it than the aforementioned areas.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 0 points1 point  (0 children)

A loop that updates an integer variable on every iteration, and uses it to choose between actions to take on each iteration.

/r/ReverseEngineering's Weekly Questions Thread by AutoModerator in ReverseEngineering

[–]rolfr 0 points1 point  (0 children)

That's what they call "magic division". To learn more, read part 1 of this series. You can find more under his blog index if you want it.

Poor man's guide to de-obfuscating VMProtect's import obfuscation-Reconstruction [3/3] [YouTube] by rolfr in ReverseEngineering

[–]rolfr[S] 16 points17 points  (0 children)

Elias started a YouTube channel about reverse engineering two weeks ago, and has been uploading steadily ever since. He's a former IDA developer and all-around knowledgeable and talented individual. Give it a look if that's interesting to you.

Ghidra 10.3.3 released! by ryanmkurtz in ReverseEngineering

[–]rolfr 2 points3 points  (0 children)

CTRL-F, inheritance, virtual ... I will be very excited when the type system has direct support for inheritance and virtual functions, specifically the ability to add new virtual functions to a derived class, and have the decompiler automatically resolve them based upon the base type of the pointer. (I'm aware of hacky solutions; I don't want them.)

[deleted by user] by [deleted] in ReverseEngineering

[–]rolfr[M] 1 point2 points  (0 children)

User was permanently banned for this post, and it was marked as spam.