hey, I know lots of infosec people follow me would anyone be willing to teach me some reverse engineering? I figured out most of the init code, entry points, etc in a binary but the logic is completely incomprehensible to me even after many days
binaries are not my focus (I RE mostly JS), but debugger and profiler are also very effective RE tools, for example you can identify an application tick by looking at short-lived CPU spikes in a flame graph
-
-
breakpoints in a system call you know is getting invoked can also be a good way of finding the core "tick" stack
-
or you proxy a function to use it as log tap (the binary equivalent would probably be overriding a syscall)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.