Description: This is the video of the talk titled "<span style="font-weight: bold;">Two very small Reverse Engineering Tools: a Python Disassembling engine and an Iterative Reverse Engineering Framework</span>" given by Gera at Recon 2008.<br><br><span style="font-style: italic;">Talk Description:</span> A couple of years ago in ReCon 2006 Pedram Amini presented PAIMEI. This awesome framework depends on IDA to disassemble binaries and get functions and basic block information. The first tool we present is an incomplete replacement of IDA (in this context) with an extra tweak on how jump-in-the-middle-of-instruction obfuscation is handled.<br><br>The second tool may be useful when reversing from binary back to C code. The idea is very simple: The reverser reads assembly and writes C, one function at a time, this new reversed C code can be compiled as a fragment and relinked into the original application. The result is a hybrid application, part original part new. This new application can be debugged, in assembly for the original part, and in C for the new reversed part. The main idea is to have, all the time, a working version of the application which is iteratively reverse engineered into C, while the reverser doesn't have to wait until the end to test the result.<br><br>A high resolution video of the talk is available here. The presentation slides can be viewed here and here are the Iterde and the Cuchi tool. <br><br> <br><style type="text/css">body { background: #FFF; } </style> </div>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.