hey, I know lots of infosec people follow me would anyone be willing to teach me some reverse engineering? I figured out most of the init code, entry points, etc in a binary but the logic is completely incomprehensible to me even after many days
-
Show this thread
-
Replying to @whitequark
binaries are not my focus (I RE mostly JS), but debugger and profiler are also very effective RE tools, for example you can identify an application tick by looking at short-lived CPU spikes in a flame graph
1 reply 0 retweets 0 likes -
Replying to @allgebrah @whitequark
breakpoints in a system call you know is getting invoked can also be a good way of finding the core "tick" stack
1 reply 0 retweets 1 like
Replying to @mcclure111 @whitequark
or you proxy a function to use it as log tap (the binary equivalent would probably be overriding a syscall)
10:20 AM - 11 Jan 2018
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.