Identifying and Avoiding NOP Instructions in Disassembly

Identifying and Avoiding NOP Instructions in Disassembly

In the workplace, a significant amount of time and effort is spent analyzing NOP instructions, which has become a concern for reverse engineers and security responders. NOP instructions are a series of instructions that have no actual significance. Besides wasting time, I have found that some people are also shocked and excited by the NOP … Read more

Introduction to ARM Assembly Programming

Introduction to ARM Assembly Programming

Welcome to the series of articles “Introduction to ARM Assembly Programming.” This series is designed to lay the groundwork for the upcoming “ARM Exploit Development Tutorial” (in progress). Before we dive into writing shellcode and constructing ROP chains using ARM assembly, we need to first grasp some fundamental knowledge about ARM assembly. We will cover … Read more

Analyzing Function Calls at the Assembly Level

Analyzing Function Calls at the Assembly Level

Introduction Assembly language is the foundation for learning reverse engineering. This article analyzes function calls from the assembly level to understand the specific implementation processes of stack pushing, jumping, execution, and returning, as well as the application of the stack. My knowledge is limited, so please point out any errors or unclear points. Your encouragement … Read more

Understanding Assembly Language: A Beginner’s Guide

Understanding Assembly Language: A Beginner's Guide

Welcome to click “The Beauty of Algorithms and Programming” ↑ Follow us! This article was first published on WeChat official account: “The Beauty of Algorithms and Programming”, welcome to follow and stay updated on more articles in this series. Introduction In today’s internet era, many teenagers enjoy playing games, such as League of Legends, PUBG, … Read more

Introduction to Assembly Language

Introduction to Assembly Language

Friends with a bit of computer knowledge must know that computers only recognize 0 and 1. Back in the day, to write a program, you had to use 0 and 1, haha, cool, right? So, the admiration for programmers might have originated from that time. Later, people found it too inconvenient to write programs using … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Analysis of TP-LINK WDR 7660 VxWorks System

Analysis of TP-LINK WDR 7660 VxWorks System

Author | Green Alliance Technology Laboratory Wei Fan Introduction:The router is the most widely used IoT device, and TP-LINK is the largest router manufacturer in China. Its WDR 7660 model router uses the VxWorks operating system for the first time, offering high real-time performance and reliability, but also presenting significant challenges for reverse analysis. This … Read more