<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on System Overlord</title><link>https://systemoverlord.com/tags/reverse-engineering.html</link><description>Recent content in Reverse Engineering on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sat, 17 Oct 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>Course Review: Reverse Engineering with Ghidra</title><link>https://systemoverlord.com/2020/10/17/course-review-reverse-engineering-with-ghidra.html</link><pubDate>Sat, 17 Oct 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/10/17/course-review-reverse-engineering-with-ghidra.html</guid><description>&lt;p&gt;If you&amp;rsquo;re a prior reader of the blog, you probably know that when I have the
opportunity to take a training class, I like to write a review of the course.
It&amp;rsquo;s often hard to find public feedback on trainings, which feels frustrating
when you&amp;rsquo;re spending thousands of dollars on that course.&lt;/p&gt;
&lt;p&gt;Last week, I took the &amp;ldquo;&lt;a href="http://infiltratecon.com/conference/training/reverse-engineering-with-ghidra.html"&gt;Reverse Engineering with
Ghidra&lt;/a&gt;&amp;rdquo;
taught by &lt;a href="https://twitter.com/0xjeremy"&gt;Jeremy Blackthorne (0xJeremy)&lt;/a&gt; of the
&lt;a href="https://www.bostoncybernetics.org/"&gt;Boston Cybernetics Institute&lt;/a&gt;. It was
ostensibly offered as part of the Infiltrate Conference, but 2020 being what it
is, there was no conference and it was just an online training. Unfortunately
for me, it was being run on East Coast time and I&amp;rsquo;m on the West Coast, so I got
to enjoy some &lt;em&gt;early&lt;/em&gt; mornings.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 5/23/14</title><link>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</link><pubDate>Fri, 23 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</guid><description>&lt;p&gt;###Radare2 Book
Maijin on GitHub is in the process of putting together an &lt;a href="https://radare.gitbooks.io/radare2book/"&gt;online book for Radare2&lt;/a&gt;. I&amp;rsquo;ve been looking for a good resource for using Radare2, and this is a great start.&lt;/p&gt;
&lt;p&gt;###Reverse Engineering for Beginners
Dennis Yurichev has a &lt;a href="http://yurichev.com/RE-book.html"&gt;free eBook on Reverse Engineering&lt;/a&gt;. I haven&amp;rsquo;t gotten through it yet, but it looks interesting, and you can&amp;rsquo;t beat the price.&lt;/p&gt;
&lt;p&gt;###Hacker Playbook
Finally, I finished up &lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; this week. You can find &lt;a href="https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/"&gt;my full review here&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Weekly Reading List for 1/18/14</title><link>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</link><pubDate>Sat, 18 Jan 2014 05:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/18/weekly-reading-list-for-11714/</guid><description>&lt;p&gt;I&amp;rsquo;ve decided to start posting a weekly reading list of interesting security-related articles I&amp;rsquo;ve come across in the past week. They&amp;rsquo;re not guaranteed to be new, but should at least still be relevant.&lt;/p&gt;
&lt;h4 id="using-a-beaglebone-to-bypass-8021x"&gt;Using a BeagleBone to bypass 802.1x&lt;/h4&gt;
&lt;p&gt;Most security practitioners are already aware that NAC doesn&amp;rsquo;t provide meaningful security. While it&amp;rsquo;ll keep some random guy from plugging in to an exposed ethernet port in the lobby (shouldn&amp;rsquo;t that be turned off?), it won&amp;rsquo;t stop a determined attacker. You can just MITM the legitimate device, let it perform the 802.1x handshake, then send packets appearing to be from the legitimate device. To make it easier, &lt;a href="http://shellsherpa.nl/nac-bypass-8021x-or-beagle-in-the-middle"&gt;ShellSherpa has put together a BeagleBone-based device to automatically MITM the NAC connection&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>LD_PRELOAD for Binary Analysis</title><link>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</link><pubDate>Mon, 13 Jan 2014 02:18:16 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/01/13/ld_preload-for-binary-analysis/</guid><description>&lt;p&gt;During the BreakIn CTF, there were a few challenges that depended on the return value of of libc functions like &lt;code&gt;time()&lt;/code&gt; or &lt;code&gt;rand()&lt;/code&gt;, and had differing behavior depending on those return values. In order to more easily reverse those binaries, it can be nice to control the return values of those functions. In other cases, you have binaries that may call functions like &lt;code&gt;unlink()&lt;/code&gt;, &lt;code&gt;system()&lt;/code&gt;, etc., where you prefer not to have those functions really called. (Though you are running these untrusted binaries in a VM, right?)&lt;/p&gt;</description></item><item><title>Lessons From the Nebula</title><link>https://systemoverlord.com/2013/03/24/lessons-from-the-nebula/</link><pubDate>Sun, 24 Mar 2013 00:46:59 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2013/03/24/lessons-from-the-nebula/</guid><description>&lt;p&gt;&lt;a href="http://exploit-exercises.com/nebula"&gt;Exploit-Exercises.com's Nebula&lt;/a&gt;, that is.  I just spent a good 8 hours or so working through the levels there, and I'm pretty sure I took much longer than I should have.  In any case, there were a couple of things I was disappointed by: running "getflag" to get a flag (or otherwise being delivered a token) didn't provide you with anything to really validate what you were doing.  You can actually jump directly to any level (which is good when you reset your VM) but not so interesting for "progression" or the sense of accomplishment -- at least for me.&lt;/p&gt;</description></item></channel></rss>