Most Popular
1500 questions
16
votes
1 answer
IDA EBP variable offset
Let's take a look of how IDA displays address of local variable. For instance:
MOV EAX, [EBP + var_4]
As we all know as far as local variables go, they are located at lower addresses of EBP.
Though, I have been taking it for granted and…

PSS
- 3,088
- 1
- 21
- 35
16
votes
3 answers
Are there any metrics for code obfuscation?
Is source code obfuscation quantifiable ?
Are there any metrics that measure the degree of obfuscation in a source file ?

asheeshr
- 2,465
- 8
- 28
- 41
16
votes
7 answers
What are the tools use for reverse engineering android apk?
Currently, I only know about apktool.
But is there any tools that helps in checking the code, editing it and compiling it back to apk?

Daniel Mana
- 269
- 1
- 2
- 4
16
votes
3 answers
Are hardware dongles able to protect your software?
Various software companies distribute their software with hardware security, usually a dongle which must be mounted in order for the software to operate.
I don't have experience with them, but I wonder, do they really work?
What is it that the…

Mellowcandle
- 4,795
- 6
- 34
- 47
16
votes
3 answers
Dynamic java instrumentation?
This is not strictly 'reverse engineering', it's mostly related to dynamic instrumentation.
So, in the same fashion as strace which allows you to see syscalls made by a process, or ftrace to see function calls, is there anything similar for…

JavaSec
- 163
- 1
- 6
16
votes
4 answers
INT 2D Anti-Forensic Method
Inclusion of an INT 2D instruction appears to be a fairly common anti-debugging tactic used by Windows malware authors. From what I understand, it causes a process to act differently when a debugger is attached from when it is not attached.
I have…

lynks
- 263
- 2
- 7
16
votes
1 answer
What are the Vectored Continue Handlers
Practically everyone knows what Vectored Exception Handlers are, but I couldn't find a lot of information about the similar "Vectored Continue Handlers" and related functions I encountered today, such as AddVectoredContinueHandler and…

NirIzr
- 11,765
- 1
- 37
- 87
16
votes
1 answer
Malware Hooking INT 1 and INT 3
I understand that on x86, INT 1 is used for single-stepping and INT 3 is used for setting breakpoints, and some other interrupt (usually 0x80 for Linux and 0x2E for Windows) used to be used for system calls.
If a piece of malware hooks the…

mrduclaw
- 4,066
- 8
- 27
- 40
16
votes
2 answers
Decoding an unknown image format with "DREK" signature (*.drk)
There are some unknow images, which I would like to decode to RRGGBBAA format. It was a really hard work, but at the moment I can somewhat understand, that which part of the binary is responsible for what. But I'm stuck at the end, and I have no…

Iter Ator
- 214
- 2
- 15
16
votes
2 answers
Is there an actively maintained collaboration plugin for IDA?
There are many IDA Pro plugins that assist with collaboration, but are any actively maintained and known to work with the latest version of IDA (version 6.9)?
These are the tools that I'm aware of, and none of them are actively maintained.
CrowdRE…

Reverser
- 179
- 4
16
votes
1 answer
Debugging third party android APKs
What are some ways to debug third party android apps (apps you don't have the source code to)? I would like to step through the APK instruction by instruction, and possibly set breakpoints on certain APIs or certain smali instructions.
I've tried…

gsgx
- 400
- 1
- 4
- 11
16
votes
2 answers
How do I work out the Ultranet protocol?
Ultranet is a audio protocol that allows low latency audio with many channels to be transmitted over standard Ethernet cables. For instance you might have a Midas sound desk transmitting audio packets to a chain of personal mixers on a stage.
There…

fret
- 262
- 1
- 2
- 6
15
votes
1 answer
Looking for exported symbols in a DLL with objdump?
I am a man full of contradictions, I am using Unix and, yet, I want to analyze a Microsoft Windows DLL.
Usually, when looking for symbols in a dynamic or static library in the ELF World, one can either use nm or readelf or even objdump. Here is an…

perror
- 19,083
- 29
- 87
- 150
15
votes
1 answer
Treating independent code as a function in IDA Pro
When reverse engineering programs, I often find functions like the one below. This function in particular has a set of nested if/else blocks (pink boxes) which would typically be fairly easy to follow. When code executes at the blue box however,…

amccormack
- 1,326
- 2
- 13
- 29
15
votes
2 answers
Is there a good reference for COM object signatures?
When doing RE on some Microsoft binaries I run across COM object references all the time. Is there a good central place to translate some of the GUID's that I find to some sort of object type without having to follow it back to some known parent…

Modoc
- 429
- 4
- 8