Questions tagged [software-security]
Field of computer science involved in the security of software and the prevention of bug exploitation by attackers.
23 questions
0
votes
0
answers
87
views
How to remove malicious OS build on Samsung Galaxy S24?
How do I remove malicious OS build on Samsung Galaxy S24?
Phone won't let me remove malicious software and all scans from multiple sources get directed to emulated files. Factory reset reinstalled all ...
2
votes
1
answer
1k
views
J1939 message payload checksum
I am attempting to reverse engineer some proprietary J1939 CAN traffic so that I can remotely control some actions on a vehicle. I have collected a number of traces covering the events I want to ...
1
vote
0
answers
188
views
silvio packer for shared libray leads to error: "ELF load command address/offset not properly aligned"
I'm trying to implement a packer based on silvio infection. The packer works fine for ET_EXEC. However, it failed with "ELF load command address/offset not properly aligned" error for the ...
0
votes
0
answers
68
views
is it possible to get code out of chipset through reverse engineering?
for example, encryption/decryption mechanism was inbuilt in a chip, to get the code that performs this mechanisms, is there some ways you can get this code through reverse engineering? what tools and ...
2
votes
2
answers
839
views
C++ hide string parameter for string viewer
bool isLaunched = CreateProcessW(
L"C:\\Windows\\System32\\Notepad.exe", // Should be shown in any string viewer or decompiler.
0x0,
0x0,
0x0,
TRUE,
0,
0x0,
...
0
votes
1
answer
580
views
Sentinel HASP Hardlock - Where is the Secure Storage Located on disk
I have a provisional license for a program attached to a specific computer. The license according to hasp resides in the "secure storage of your pc" does anyone know where this is? If I reset the pc ...
2
votes
1
answer
303
views
Has there been any success in using deep learning for reverse engineering?
So has there been any success in using deep learning for doing reverse engineering?
i couldn't find anything useful other than some theoretical papers, so was there any talk about this in recent ...
3
votes
3
answers
4k
views
Android- hiding private keys in .so file
I am working on an application where we need to encrypt certain assets at compile time in Gradle. We then need to decrypt them with the same private key, so we are using a symmetric key system but we ...
3
votes
3
answers
283
views
Debug vs Release binaries - Overflow detection
I'm reading the IDA Pro book and in chapter 20 the author shows the following code from a debug build:
push ebp
mov ebp, esp
sub esp, 0F0h
push ebx
push esi
push edi
lea edi, [ebp+var_F0]
mov ecx, ...
0
votes
2
answers
831
views
Basic tampering protection
I'm trying to create a basic program that has memory tampering protection, however it always says it's correct, even if I nop the whole license check function in Ollydbg or change and rebuild the code....
0
votes
1
answer
1k
views
Security bypass: How to run application in Android Emulator?
I need to run "Yanosik" in Android Emulator Genymotion.
Developers block in app runnning it in Android Emulator - when I try download it via Playstore, it says that my device is incompatible. When I ...
2
votes
1
answer
433
views
Why is otkloadr.WRAssembly.1 reference present in a office file?
I was working with a RTF file and I found the string "otkloadr.WRAssembly.1" present inside the file in plain sight.
I know that many exploits use this for loading the msvcr71.dll (non-ASLR module).
...
1
vote
0
answers
828
views
SysTracer by SysReveal.com clean?
SysTracer from SysReveal.com (not from www.blueproject.ro) seems to be a very nice tool for live monitoring your system and check what executable files do at your system. I saw some videos on YouTube ...
0
votes
1
answer
58
views
Is the security of this .net application flawed? [closed]
Ok, I know that every obfuscated .Net application can be reverse engineered.
And I know that it is better if I go the open source way if possible. But unfortunately I cannot because there is no ...
0
votes
1
answer
135
views
The Suffering - Ad supported [closed]
I aplogize in advanve for my beginners question. I also aplogize if this post is in the wrong thread or the wrong board. I just thought this may belong here.
The technical part:
I just downloaded the ...
1
vote
1
answer
5k
views
Can't change the icon of a .exe file. Seems to be protected?
I'm trying to change the icon of a .exe file, normally a simple task but this .exe file is a installer and for some reason when after I change or remove the icon, the exe shrinks in size from 300 mb ...
3
votes
1
answer
3k
views
Check if binary was compiled with security checks (/GS)
I have to check massive amount of binaries whether they were compiled with the /GS option. I assume a good indicator would be to check if they have stack cookie or not. Do you know any tool that can ...
1
vote
1
answer
975
views
Can Trusted computing/TPM defeat crack attempts?
I read some things about trusted computing platforms (TPM) and its applications in the past.
AFAIK, its applications include such things as countering software reverse engineering/crack and cheating ...
2
votes
0
answers
239
views
What is the difference between Software Architecture Recovery and Software Remodularization in the context of Reverse Engineering?
In the reverse engineering scenario, after extracting a representation of the code, it is often useful to recover/ reconstruct the architecture of the software (for eg. when reverse engineering java ...
1
vote
2
answers
195
views
How to find the version number of Android Ad libraries from reverse engineered apps?
I am analysing Android ad libraries. I have downloaded apps from Google play and used dex2jar and JDGUI to recover the Java code of the app. As expected a lot of apps use ad libraries (such ad Google ...
7
votes
2
answers
3k
views
What skills, other than practice, should I acquire to be good at reverse engineering softwares?
What would help me to be improve my self, What subjects should I study and learn from which increase my ability to be be better at reverse engineering a software ? i.e: Calculus, Integration ?
3
votes
2
answers
735
views
How to compile c, cpp and python code as "Released/Final" version?
I want to know if there are ways to compile C, C++ and Python code in order to not be able to reverse engineering it over Linux or not?
I have heard there are some ways over Windows to do it, but I ...
12
votes
1
answer
5k
views
Understanding the most recent heap implementation under Linux
A few days ago, I was wondering how one could teach himself heap-based overflow exploitation.
So I searched through documentation, subsequently practicing what I read in order to have a better ...