赛派号

欧擎投影仪p3自动对焦 Reverse Engineering Blog

Investigating a HTML Obfuscator 20 Feb 2025

I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....

Reversing VMCrack 01 Sep 2024

Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...

Using Symbolic Execution to Devirtualise a Virtualised Binary 22 Jul 2024

Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...

Deal or No Deal: Graphing a Binary Rev Challenge 19 May 2024

This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t great at handling this sample, so I used Ghidra instead. Following the entry point...

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至lsinopec@gmail.com举报,一经查实,本站将立刻删除。

上一篇 没有了

下一篇没有了