Skip to main content

Questions tagged [software-security]

Field of computer science involved in the security of software and the prevention of bug exploitation by attackers.

Filter by
Sorted by
Tagged with
0 votes
0 answers
87 views

How to remove malicious OS build on Samsung Galaxy S24?

How do I remove malicious OS build on Samsung Galaxy S24? Phone won't let me remove malicious software and all scans from multiple sources get directed to emulated files. Factory reset reinstalled all ...
Tobin's user avatar
  • 1
2 votes
1 answer
1k views

J1939 message payload checksum

I am attempting to reverse engineer some proprietary J1939 CAN traffic so that I can remotely control some actions on a vehicle. I have collected a number of traces covering the events I want to ...
tranzallos's user avatar
1 vote
0 answers
188 views

silvio packer for shared libray leads to error: "ELF load command address/offset not properly aligned"

I'm trying to implement a packer based on silvio infection. The packer works fine for ET_EXEC. However, it failed with "ELF load command address/offset not properly aligned" error for the ...
prgbenz's user avatar
  • 81
0 votes
0 answers
68 views

is it possible to get code out of chipset through reverse engineering?

for example, encryption/decryption mechanism was inbuilt in a chip, to get the code that performs this mechanisms, is there some ways you can get this code through reverse engineering? what tools and ...
hanan's user avatar
  • 309
2 votes
2 answers
839 views

C++ hide string parameter for string viewer

bool isLaunched = CreateProcessW( L"C:\\Windows\\System32\\Notepad.exe", // Should be shown in any string viewer or decompiler. 0x0, 0x0, 0x0, TRUE, 0, 0x0, ...
William's user avatar
  • 21
0 votes
1 answer
580 views

Sentinel HASP Hardlock - Where is the Secure Storage Located on disk

I have a provisional license for a program attached to a specific computer. The license according to hasp resides in the "secure storage of your pc" does anyone know where this is? If I reset the pc ...
rob-DEV's user avatar
  • 19
2 votes
1 answer
303 views

Has there been any success in using deep learning for reverse engineering?

So has there been any success in using deep learning for doing reverse engineering? i couldn't find anything useful other than some theoretical papers, so was there any talk about this in recent ...
John P's user avatar
  • 207
3 votes
3 answers
4k views

Android- hiding private keys in .so file

I am working on an application where we need to encrypt certain assets at compile time in Gradle. We then need to decrypt them with the same private key, so we are using a symmetric key system but we ...
georgetheevilman's user avatar
3 votes
3 answers
283 views

Debug vs Release binaries - Overflow detection

I'm reading the IDA Pro book and in chapter 20 the author shows the following code from a debug build: push ebp mov ebp, esp sub esp, 0F0h push ebx push esi push edi lea edi, [ebp+var_F0] mov ecx, ...
Trey's user avatar
  • 437
0 votes
2 answers
831 views

Basic tampering protection

I'm trying to create a basic program that has memory tampering protection, however it always says it's correct, even if I nop the whole license check function in Ollydbg or change and rebuild the code....
JeffreyZ's user avatar
  • 219
0 votes
1 answer
1k views

Security bypass: How to run application in Android Emulator?

I need to run "Yanosik" in Android Emulator Genymotion. Developers block in app runnning it in Android Emulator - when I try download it via Playstore, it says that my device is incompatible. When I ...
Rumcajs's user avatar
2 votes
1 answer
433 views

Why is otkloadr.WRAssembly.1 reference present in a office file?

I was working with a RTF file and I found the string "otkloadr.WRAssembly.1" present inside the file in plain sight. I know that many exploits use this for loading the msvcr71.dll (non-ASLR module). ...
rebel87's user avatar
  • 391
1 vote
0 answers
828 views

SysTracer by SysReveal.com clean?

SysTracer from SysReveal.com (not from www.blueproject.ro) seems to be a very nice tool for live monitoring your system and check what executable files do at your system. I saw some videos on YouTube ...
John Doof's user avatar
  • 111
0 votes
1 answer
58 views

Is the security of this .net application flawed? [closed]

Ok, I know that every obfuscated .Net application can be reverse engineered. And I know that it is better if I go the open source way if possible. But unfortunately I cannot because there is no ...
Vahid's user avatar
  • 109
0 votes
1 answer
135 views

The Suffering - Ad supported [closed]

I aplogize in advanve for my beginners question. I also aplogize if this post is in the wrong thread or the wrong board. I just thought this may belong here. The technical part: I just downloaded the ...
Keks411's user avatar
1 vote
1 answer
5k views

Can't change the icon of a .exe file. Seems to be protected?

I'm trying to change the icon of a .exe file, normally a simple task but this .exe file is a installer and for some reason when after I change or remove the icon, the exe shrinks in size from 300 mb ...
Joesph's user avatar
  • 13
3 votes
1 answer
3k views

Check if binary was compiled with security checks (/GS)

I have to check massive amount of binaries whether they were compiled with the /GS option. I assume a good indicator would be to check if they have stack cookie or not. Do you know any tool that can ...
Dominik Antal's user avatar
1 vote
1 answer
975 views

Can Trusted computing/TPM defeat crack attempts?

I read some things about trusted computing platforms (TPM) and its applications in the past. AFAIK, its applications include such things as countering software reverse engineering/crack and cheating ...
user40602's user avatar
  • 111
2 votes
0 answers
239 views

What is the difference between Software Architecture Recovery and Software Remodularization in the context of Reverse Engineering?

In the reverse engineering scenario, after extracting a representation of the code, it is often useful to recover/ reconstruct the architecture of the software (for eg. when reverse engineering java ...
Annamalai N's user avatar
1 vote
2 answers
195 views

How to find the version number of Android Ad libraries from reverse engineered apps?

I am analysing Android ad libraries. I have downloaded apps from Google play and used dex2jar and JDGUI to recover the Java code of the app. As expected a lot of apps use ad libraries (such ad Google ...
Annamalai N's user avatar
7 votes
2 answers
3k views

What skills, other than practice, should I acquire to be good at reverse engineering softwares?

What would help me to be improve my self, What subjects should I study and learn from which increase my ability to be be better at reverse engineering a software ? i.e: Calculus, Integration ?
3 votes
2 answers
735 views

How to compile c, cpp and python code as "Released/Final" version?

I want to know if there are ways to compile C, C++ and Python code in order to not be able to reverse engineering it over Linux or not? I have heard there are some ways over Windows to do it, but I ...
MLSC's user avatar
  • 331
12 votes
1 answer
5k views

Understanding the most recent heap implementation under Linux

A few days ago, I was wondering how one could teach himself heap-based overflow exploitation. So I searched through documentation, subsequently practicing what I read in order to have a better ...
Geoffrey R.'s user avatar