, 15 2017 . 10:42
+

!
reverse engineering (RE). , RE. , , .
, , , , . , , /, .
: , , . , , ;)
, !
a.
b. (fuzzing)
c.
d.
a. IDA Pro
b. Radare2
c. WinDBG (Ollydbg / Immunity Debugger / x64dbg)
d. GDB
e. DBI
f. SMT
g. Python
h. BAF (Binary Analysis Frameworks)
a. x86-x86_64
b. ARM
a. Windows
b. Linux
c. Mac OS(OSX) / iOS
d. Android
-
a. PE
b. ELF
c. Mach-O
a. C/C++
b. Assembler
a. War games
1.
RE. , , , , .
1.a Reverse engineering
- " " , ;
- "Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation" "" , , ;
- " " , . , , , ;
- "Practical RE tips" webinar Gynvael Coldwind, RE;
- "OPENSECURITYTRAINING.INFO" RE ;
- "Digging Through the Firmware" Practical Reverse Engineering , ;
- "Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives" firmware security, UEFI BIOS, , ;
- CRYPTO101 , .
1.b
1.c
- "Exploit Writing Tutorials by Corelan Team" () , ;
- "Exploit Development Community" ( ) IE 10 11 ;
- "Modern Binary Exploitation" RPISEC , Rensselaer Polytechnic Institute;
- "Web- Vupen" VirualBox, XEN, Firefox, IE10, Windows Kernel, Adobe Flash, Adobe Reader;
- "Project Zero" Google, ;
- "Browser mitigations against memory corruption vulnerabilities" , :
- "SoK: Eternal War in Memory" , , ;
- "Writing Exploits for Win32 Systems from Scratch" SLMAIL;
- Phrack Phrack. , , "The Art of Exploitation";
- "The Shellcoder's Handbook: Discovering and Exploiting Security Holes" , .
1.d
2.
, RE.
2.a IDA Pro
2.b Radare2
2.c WinDBG (Ollydbg / Immunity Debugger / x64dbg)
. Windows, GDB. , :
2.d GDB
2.e DBI
. DBI . :
2.f SMT
SMT-? , SMT- , .
SMT , , SMT- .
, SMT .
SMT- . :
- ( /);
- ;
- "" ;
- ( "");
- (, ROP).
SMT , - "" .
, :
2.g Python
Python , ( ). , ( , ):
2.h BAF (Binary Analysis Frameworks)
, . , :
/:
3.
. (MIPS, PowerPC ..).
3.a x86-x86_64
3.b ARM
4.
.
4.a Windows
4.b Linux
4.c Mac OS(OSX) / iOS
4.d Android
, .
5.a PE
5.b ELF
5.c Mach-O
corkami "" , , . .
6.
- , 80% . , , . . , , ;)
6.a C/C++
6.b ASM
7.
online-, .
7.a War Games
:
https://habrahabr.ru/post/334832/
:
author dukebarman
-
digital security
reverse engineering