Skip to main content

Questions tagged [binary-code]

Filter by
Sorted by
Tagged with
-1 votes
1 answer
294 views

I started reading "Hacking, The Art of Exploitation" and I am confused about some things regarding memory examination. When I disassemble main, I get an output of all memories where the ...
jprossv's user avatar
1 vote
1 answer
614 views

Excuse the naive question but I'm trying to understand a bit about security in home health and medial devices and a recent report about how home Covid test results can be altered has left me a bit ...
orome's user avatar
  • 333
0 votes
0 answers
31 views

The thing that helped me to understand what is a "public key" was to parallel it with a door lock: The door lock is public in the sense that anyone can try to unlock it and the door key is ...
humble-learner's user avatar
1 vote
1 answer
250 views

I am pentesting a web application. It makes a backend call to another application, and I am trying to hijack that call. I have gained control over the URL path, query parameters, and fragment that is ...
Bob's user avatar
  • 99
2 votes
1 answer
471 views

Using standard hardening options like PIC, Stack Protection ... does a mere recompilation make a program more secure against attacks? You have the source code of a program, compile it two times with ...
plsrespond's user avatar
1 vote
0 answers
485 views

The challenge data is: ...
CtfLover's user avatar
2 votes
0 answers
189 views

Kernels like linux-libre (standard in Debian and other free Linux distributions) ship no binary firmware packages by default. From my limited understanding of their functionality, a binary firmware ...
Prototype700's user avatar
9 votes
0 answers
2k views

My question is about the use of ultrasonic messages that are part of the modern advertising ecosystem and are also used by the Google Nearby Messages API. When it comes to advertising, the type of ...
user100487's user avatar
2 votes
0 answers
503 views

I am trying to upsolve a challenge from a CTF I played but I just can't get it right. I think you have to somehow manage to use buffer overflow, but I can't see what I'm doing wrong since this works ...
C. Cristi's user avatar
  • 121
-1 votes
3 answers
1k views

Would using a 256-bit binary string, for e.g. ...
Woodstock's user avatar
  • 699
3 votes
1 answer
232 views

Is there any good reason not to run a brief unknown (30 line) assembly script inline in a usermode c program for dynamic analysis directly on my laptop? There's only one system call to time, and at ...
comp.sci.intern's user avatar
0 votes
1 answer
224 views

If researcher found satisfiability in any software, this is a threat to security? If answer - "Yes", how can attacker to use SAT?
69 420 1970's user avatar
1 vote
2 answers
2k views

I want to make well-known malicious programs, like Mimikatz and Incognito, undetectable by anti-virus solutions. I have already tried various approaches myself, like packing the binary with UPX or ...
Shuzheng's user avatar
  • 1,317
1 vote
1 answer
668 views

I have a binary that is SUID which I can currently use a buffer overflow exploit to obtain an elevated EUID shell. However I haven't worked much with changing IDs through shellcode, and the file I ...
Sif's user avatar
  • 13
4 votes
1 answer
226 views

Unidirectional Data Transmission to a Smartphone I'm going to use an old Android phone to store sensitive data (e.g., Bitcoin wallet private key), with no SIM card and WiFi and Bluetooth turned off. ...
anton_'s user avatar
  • 41
-1 votes
1 answer
309 views

I'm a network Penetration Tester and I'm trying to learn how to crack binaries. As an exercise, I've spent two days trying to crack a Linux binary that was supposedly designed to be cracked. ...
user7451333's user avatar
1 vote
2 answers
228 views

I have a binary file which uses some exploit(i guess, it was generated with metasploit), but I can`t determine the exact exploit it uses. The disassembly listing of it contains a plenty of "mov" ...
AseN's user avatar
  • 154
15 votes
1 answer
5k views

First Hand Details TEG (The Equation Group) is NSA's team of hackers who'd write code to exploit systems worldwide. Some of the private files were recently dropped by a group called Shadow Brokers and ...
Shritam Bhowmick's user avatar
1 vote
1 answer
16k views

So, this online discussion function use decoded account names in every post, along with that they call "logging data", an example of this can be: Loggin data: 10878 Encoded account info: ...
Sandman's user avatar
  • 111
11 votes
4 answers
7k views

I wonder which of these things is more secure. Imagine hard coded credentials, similar to this: if user.Equals("registereduser") && (password.Equals(encryptedpassword)) { Give access to ...
user3421's user avatar
  • 119
8 votes
4 answers
4k views

My questions is related with static code analysis approach used by Veracode vs Fortify/AppScan. Veracode – Finds security flaws in application binaries and bytecode without requiring source Fortify/...
hindiuniversity's user avatar
6 votes
1 answer
8k views

I am a beginner in Reverse Engineering and am trying to improve my skill by participating in any CTF's I can and solving CrackMe's. I am trying to find out why Binary Exploitation and Reverse ...
bi0s.kidd0's user avatar
2 votes
1 answer
2k views

Background: I'm working with Node's crypto library. I'm using PBKDF2 to convert a variable-length binary "passphrase" into constant-length keys for an AES cipher later on. The underlying source of ...
smitelli's user avatar
  • 2,115
4 votes
1 answer
381 views

It is a well known vulnerability that a properly altered compiler binary can transfer itself to new binaries of the compiler, and still be entirely absent from the source code. But how real is this ...
lurscher's user avatar
  • 1,250
8 votes
5 answers
2k views

I understand that with OpenSource software, my milage may vary based on the trust of the author and the distribution platform they use (Codeplex, Git, or private server). Oftentimes a FOSS website ...
makerofthings7's user avatar