Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

Sharing Ideas on Strong Network Cup S8 Rust Pwn Chat-With-Me Problem

1 Problem-Solving Ideas The final number of solutions for this problem is 42, as the difficulty level is not high and generally meets expectations. The problem is coded in Rust, and it was decided to remove symbols without providing the source code the night before the competition. This not only made it very difficult for … Read more

Python Reverse Engineering Summary

Python Reverse Engineering Summary

Discuss common types of Python questions. One The first type: Direct Decompilation Type In addition to directly obtaining the Python file for the question, the question setter can also slightly modify it by providing the corresponding .pyc file, which is the bytecode of Python. Definition of PYC File PYC files are the main intermediate files … Read more

Identifying and Avoiding NOP Instructions in Disassembly

Identifying and Avoiding NOP Instructions in Disassembly

In the workplace, a significant amount of time and effort is spent analyzing NOP instructions, which has become a concern for reverse engineers and security responders. NOP instructions are a series of instructions that have no actual significance. Besides wasting time, I have found that some people are also shocked and excited by the NOP … Read more

Introduction to ARM Assembly Programming

Introduction to ARM Assembly Programming

Welcome to the series of articles “Introduction to ARM Assembly Programming.” This series is designed to lay the groundwork for the upcoming “ARM Exploit Development Tutorial” (in progress). Before we dive into writing shellcode and constructing ROP chains using ARM assembly, we need to first grasp some fundamental knowledge about ARM assembly. We will cover … Read more

Analyzing Function Calls at the Assembly Level

Analyzing Function Calls at the Assembly Level

Introduction Assembly language is the foundation for learning reverse engineering. This article analyzes function calls from the assembly level to understand the specific implementation processes of stack pushing, jumping, execution, and returning, as well as the application of the stack. My knowledge is limited, so please point out any errors or unclear points. Your encouragement … Read more

Understanding Assembly Language: A Beginner’s Guide

Understanding Assembly Language: A Beginner's Guide

Welcome to click “The Beauty of Algorithms and Programming” ↑ Follow us! This article was first published on WeChat official account: “The Beauty of Algorithms and Programming”, welcome to follow and stay updated on more articles in this series. Introduction In today’s internet era, many teenagers enjoy playing games, such as League of Legends, PUBG, … Read more

Analysis of Firmware Loading Address Security

Analysis of Firmware Loading Address Security

Author | Green Alliance Technology Ge Wu Laboratory Chen Jie Introduction: In firmware analysis, it is often necessary to locate the firmware’s loading address, especially the memory address where Vxworks or Linux kernel is loaded into memory, which facilitates reverse engineering tools like IDA PRO for correct disassembly and string references. In the following sections, … Read more