techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#reverseengineering

13 posts13 participants0 posts today

Final DEF CON edition drop!

What’s really sold in dark web markets? Reversing the Dark Web explores the underground cybercrime economy through real ads and real malware samples.

This book walks you through stealers, loaders, ransomware, crypters, and more—with hands-on reverse engineering using Ghidra and x64dbg. Look for the @defcon edition at our booth this year!

Also available for pre-order: nostarch.com/reversing-dark-web

Analysis of #Koske #miner.

It is an AI-generated #Linux #malware which was hidden in images with pandas. It supports wide variety of coinminers for various cryptocurrencies and for GPU and different CPU architectures. Its another component, #rootkit #hideproc, tries to hide the Koske miner from file listings and processes.

malwarelab.eu/posts/koske-pand

Video from #anyrun analysis:

youtube.com/watch?v=1OSPp996XQ4

Most Android apps don’t expose much through services. But system apps? That’s where things get interesting...

This blog post by David Lodge explains how Android services work and looks into the security risks of AIDL (Android Interface Definition Language) services.

They’re often used by OEMs to expose system-level functionality, sometimes without proper permission checks. That makes them a worthwhile attack surface if you’re testing vendor builds or reviewing apps with elevated privileges.

📌Learn more here: pentestpartners.com/security-b

Hello! It's #nakeddiefriday today again, and it will be a little bit different today. The die I got for you is a smartcard chip, marked K740A by ST. This came out of some scrap I bought on the net.

Here is an overview shot of the whole thing. I think I oriented it correctly, with two top bond-outs being power supply. There is one more pad that's not bonded out.

Hi Android #reverseengineering friends. I am new in this field and wanted to try something out... it's probably pure basics. I got an APK and ran `strings` on the `classes.dex` file. There's an interesting URL embedded which might be related to downloading firmware. When running curl, I get two `301 Moved Permanently`. Manually resolving to the new location results in an HTML file with a "Page not found" message so I guess that there's basic auth. How can I decompile the code around that string?

I bought a cheap, modern, toy games console from AliExpress that wasn't a NES clone and reverse engineered it. It turns out to be based around a 8MHz WDT65c02 with 2kB of RAM, embedded into a blob chip, with a really interesting OS.

youtube.com/watch?v=jJ0XmZvR4bU

I made an SDK for it: github.com/davidgiven/tony-sdk

#reverseengineering #6502 #homebrew #retrocomputing