Vulnerability Development mailing list archives
Re: RE: Techniques for Vulneability discovery
From: LS <hydrax () netvision net il>
Date: Mon, 08 Apr 2002 21:05:31 +0200
I know what you mean. I wasn't suggesting blindly breaking on APIs or library calls of course. I think in today's scene you need to use both a disassembler and a debugger to get a good grasp of what is going on. A personal note: I've looked at so many programs before, my eyes can't stand the sight of asm code anymore ;-) I've learned quite a lot of things, but one of them is certain and that is finding WHERE in the code user input is entered.. What is done with it, is something else.... Lord Soth 06/04/02 01:25:08, Pedro Hugo <fractalg () highspeedweb net> wrote:
Well that could be done breakpointing system api's like strcpy etc etc etc or the equivalent in windows. But doing that without any reference would be a pain in the ass task. One of the tricks in reverse engineering is breakpointing the right place. After you get the right place things go a lot easier. One of the most used tricks in software protections is making it difficult to find the right places to breakpoint (much others exist of course, but these ones try to avoid easy dead listing approaches for example). Without the "entry point" it's much harder to go to the place you want. So you still have the usual problem about finding the place with problems. Being in assembler it makes things much harder to understand. Debugging and disassembling could be, in my opinion, more helpful to track more complex bugs and to help understanding foreign code, like trojans and backdoors. As in Phrack 58 article about runtime binary encryption: "Forensic work on binary executeables will become very difficult, and most of the people who do forensics nowadays will drop out of the field. Most likely some people from the reverse engineering 'scene' will convert more to network security and become forensics." I think this field is one of the possible futures in the security scene. Good tools are rare, and good people doing it not very common too. Encryption and packing is one of the biggest challenges in the reverse engineering field. Look at popular Windows shareware programs and you will understand.
Current thread:
- Techniques for Vulneability discovery kaipower (Apr 04)
- RE: Techniques for Vulnerability discovery Oliver Petruzel (Apr 05)
- Re[2]: Techniques for Vulnerability discovery dullien (Apr 06)
- Re[2]: Techniques for Vulnerability discovery dullien (Apr 06)
- RE: Techniques for Vulnerability discovery Leon (Apr 08)
- Re: Techniques for Vulneability discovery Florian Hobelsberger / BlueScreen (Apr 05)
- Re: Techniques for Vulneability discovery Josha Bronson (Apr 05)
- Re: Techniques for Vulneability discovery LS (Apr 05)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- Re: RE: Techniques for Vulneability discovery LS (Apr 08)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- RE: Techniques for Vulneability discovery Marc Maiffret (Apr 05)
- Re: Techniques for Vulneability discovery NoCoNFLiC (Apr 05)
- Re: Techniques for Vulneability discovery 3APA3A (Apr 06)
- Re: Techniques for Vulneability discovery Rafael Anschau (Apr 09)
- Re: Techniques for Vulneability discovery GomoR (Apr 09)
- RE: Techniques for Vulneability discovery David Hawley (Apr 10)
- <Possible follow-ups>
- RE: Techniques for Vulneability discovery Ed Moyle (Apr 05)
- RE: Techniques for Vulneability discovery W. Lee Schexnaider (Apr 05)
- RE: Techniques for Vulneability discovery John Daniele (Apr 07)
- Re: Techniques for Vulneability discovery Ivan Arce (Apr 05)
(Thread continues...)
- RE: Techniques for Vulnerability discovery Oliver Petruzel (Apr 05)