Analyzing Function Calls at the Assembly Level

Analyzing Function Calls at the Assembly Level

Introduction Assembly language is the foundation for learning reverse engineering. This article analyzes function calls from the assembly level to understand the specific implementation processes of stack pushing, jumping, execution, and returning, as well as the application of the stack. My knowledge is limited, so please point out any errors or unclear points. Your encouragement … Read more

Understanding Assembly Language: A Beginner’s Guide

Understanding Assembly Language: A Beginner's Guide

Welcome to click “The Beauty of Algorithms and Programming” ↑ Follow us! This article was first published on WeChat official account: “The Beauty of Algorithms and Programming”, welcome to follow and stay updated on more articles in this series. Introduction In today’s internet era, many teenagers enjoy playing games, such as League of Legends, PUBG, … Read more

Introduction to Assembly Language

Introduction to Assembly Language

Friends with a bit of computer knowledge must know that computers only recognize 0 and 1. Back in the day, to write a program, you had to use 0 and 1, haha, cool, right? So, the admiration for programmers might have originated from that time. Later, people found it too inconvenient to write programs using … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more

Analysis of TP-LINK WDR 7660 VxWorks System

Analysis of TP-LINK WDR 7660 VxWorks System

Author | Green Alliance Technology Laboratory Wei Fan Introduction:The router is the most widely used IoT device, and TP-LINK is the largest router manufacturer in China. Its WDR 7660 model router uses the VxWorks operating system for the first time, offering high real-time performance and reliability, but also presenting significant challenges for reverse analysis. This … Read more

Analysis and Solution of an Unexpected Mining Trojan Virus

Analysis and Solution of an Unexpected Mining Trojan Virus

Since I changed my job position, I haven’t researched reverse security for about 4 or 5 years. I thought I would have no connection with this profession again, but unexpectedly, today I had a chance to “enjoy” it again due to a random opportunity. Recently, my colleagues in the company have been constantly reporting that … Read more

Analysis of BLE Communication in Loock Touch Smart Lock

Analysis of BLE Communication in Loock Touch Smart Lock

This article is a featured article from the Kanxue ForumAuthor of Kanxue ForumID: Hu Yimi 1 Introduction In this article, we share some research content about the Loock Touch smart lock, which is produced by Yunding Technology. Yunding Technology is a company focused on the research and production of smart home security products, with two … Read more

A Simple Analysis of STM32 Firmware

A Simple Analysis of STM32 Firmware

This article is a highlight from the Kanxue Forum. Author ID on Kanxue Forum: Shaobanjia After reading the STM32 firmware reverse engineering thread on the forum (https://bbs.pediy.com/thread-272811.htm), I found a help request in the comments about the STM32 chip program that uses the XTEA encryption algorithm, but I couldn’t understand the data sorting issue (https://bbs.pediy.com/thread-272872.htm). … Read more