Blogs Reverse has a lot in common with the realm of computer security

  • March 14, 2022
  • 186 views

  • 0 comments

  • 0 favorites

Engineering disciplines including civil engineering, mechanics, naval architecture, aeronautics, and others use

Engineering disciplines including civil engineering, mechanics, naval architecture, aeronautics, and others use reverse engineering to learn more about a system's inner workings. In the context of white box analysis, utilizing analysis tools like a disassembler or decompiler is generally analogous to going reverse in the computer field. Later, we'll discuss the various analytical settings. Some tools, such as Wireshark, may be used to sniff the network and evaluate the input/output of the software, which we'll discuss later.

Reverse has a lot in common with the realm of computer security. A Linux distribution known as Kali Linux (formerly known as backtrack) is a fantastic place to begin learning about the reverse world. Many websites, conferences (Night Du Hack, Hack in Paris, Defcon, etc.), books, and other media are available to assist you on your journey into this unknown territory. The only decision you have to make is whether to wear a white hat or a black one. Do you consider yourself to be a security expert or a hacker? Which side you're on depends on your strength.

target
However, what's the point of doing it backwards? There are several applications for reverse in computing:

It may be utilized to get a thorough understanding of how the program works.

Enhance software security and quality (find defects, study viruses to eradicate them, etc.),

Allow the evasion of software security measures (license number, etc.),

Override proprietary software DRM and constraints to replicate software behavior.

Many proprietary programs are available under free licenses, so it may be used.
Samba, a well-known Linux and Windows file and printer sharing utility, might be used as an example. Andrew Tridgell first finished this SMB/CIFS protocol implementation via network analysis. For NVIDIA graphics cards, the X.org Foundation has created Nouveau, a project that analyzes the behavior of the official NVIDIA driver and its link to hardware and the Linux kernel in order to provide a totally royalty-free kernel for Linux computers.

Skill
This "reverse" circle is only open to those with the least amount of baggage. List of non-exhaustive examples follows.

The ability to grow
Learn about the target processor's specs (e.g., CISC (Complex Instruction Set Computing): x86, RISC (Reduced Instruction Set Computing): arm).

A good place to start is to learn about the optimization technology related to compilation theory implemented by the processor: loop expansion (if the code generated by the loop can be put into the code page (4KB on X86 / x64), delete the loop and copy the code for as many iterations of the loop as the number of iterations of the loop), alignment, and so on.

Make sure you have a solid base of compilation (morphology, syntax, semantic analysis, parser, code generation, etc.),

Be able to identify forms and patterns

To be a great reverse engineer, you must be able to think on your feet!

Tags:

0 Comments

There are no comments yet. Add a comment.

Video CMS powered by ViMP (Ultimate) © 2010-2024