Reversing A Simple Obfuscated Application
Posted on Tue 30 September 2014 in Reverse Engineering • Tagged with linux, 32bit, debugging, reverse engineering
Posted on Tue 30 September 2014 in Reverse Engineering • Tagged with linux, 32bit, debugging, reverse engineering
Posted on Wed 24 September 2014 in Reverse Engineering • Tagged with windows, reverse engineering, debugging
Posted on Tue 01 July 2014 in Reverse Engineering • Tagged with exploit development, linux, 32bit, reverse engineering, buffer overflow, debugging
Detecting buffer overflows, format string and integer overflow vulnerabilities using binary analysis in gdb on 32bit Linux