Security Alerts & News
by Tymoteusz A. Góral

History
#1815 Practical reverse engineering part 5 - digging through the firmware
I’m gonna explain some basic theory on the Linux architecture, disassembling binaries, and other related concepts. Feel free to skip some of the parts marked as [Theory]; the real hunt starts at ‘Looking for the Default WiFi Password Generation Algorithm’. At the end of the day, we’re just: obtaining source code in case we can use it, using grep and common sense to find potentially interesting binaries, and disassembling them to find out how they work.
Read more
#1815 Practical reverse engineering part 5 - digging through the firmware
#1814 Bypassing exploit protection of NORTON Security
#1813 The banker that encrypted files
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12