reverseengineering
-
Buffer Overflow Through Vulnerable Program (Unix OS)
Tags: reverseengineering securityThe following program is an example of insecure implementation that enable the user to inject shell commands during its execution. It uses the system() function that executes commands into the host environment through the command processor and it returns after the command has been completed. Sys... Read More
-
Stack Overflow Explained
Tags: reverseengineering security
-
Investigating Car Key (RF Remote Control) With HackRF One - Part 1
Tags: reverseengineering security rfFirst of all, I would like to register that this post has no intention to teach how to break the laws, to ensure this I will omit the car model and suppress any other information that could open a window for malicius people. I want to mension that it is just a theme that should be developed for s... Read More
-
Reversing a BIOS Flash Via Hardware - First Steps
Tags: reverseengineering securityThis brief tutorial about dumping the BIOS (Basic Input/Output System) content directly via hardware (Programmer MiniPro TL866), will pass to you the procedure executed to get BIOS binary code. Other articles of this blog will cover binary contents analysis and some modifications based on its dis... Read More
Popular Tags
control
computernetwork
embeddedsystems
security
softwaredevelopment
rf
reverseengineering
digitalprocessing