📜 ⬆️ ⬇️

Favorites: reverse engineering links


Hello!


Today we would like to share our list of materials on reverse engineering (RE). This list is very extensive, because our research department is primarily concerned with the tasks of RE. In our opinion, the selection of materials on the topic is good for the start, while it may be relevant for a long time.


We have been sending this list of links, resources, books for five years to people who would like to get into our research department, but they don’t yet pass by the level of knowledge or are just starting their way in the field of information security. Naturally, this list, like most of the materials / collections, will need updating and updating in some time.


Funny fact: we were shown how some companies send out our list of materials from themselves, but only in a very old edition. And after this publication, they will finally be able to use its updated version with a clear conscience;)


So, go to the list of materials!


  1. Topics
    a. Reverse
    b. Search for vulnerabilities (fuzzing)
    c. Vulnerability Exploitation
    d. Malicious code analysis
  2. Instruments
    a. IDA Pro
    b. Radare2
    c. WinDBG (Ollydbg / Immunity Debugger / x64dbg)
    d. Gdb
    e. DBI
    f. SMT
    g. Python to automate
    h. BAF (Binary Analysis Frameworks)
  3. Architecture
    a. x86-x86_64
    b. ARM
  4. OS
    a. Windows
    b. Linux
    c. Mac OS (OSX) / iOS
    d. Android
  5. File formats
    a. PE
    b. ELF
    c. Mach-o
  6. Programming
    a. C / C ++
    b. Assembler
  7. Practice
    a. War games



1. Topics


In this section, we will look at the main areas of RE application. Let's start directly from the reverse development process itself, move on to finding vulnerabilities and developing exploits, and, of course, let's get to malware analysis.


1.a Reverse engineering



1.b Vulnerability Scan



1.c Examples of exploitation of found vulnerabilities



1.d Malware Analysis



2. Necessary tools


Below are the popular tools used in RE.


2.a IDA Pro



2.b Radare2



2.c WinDBG (Ollydbg / Immunity Debugger / x64dbg)


Without knowledge of the principles of the debugger and the ability to use it, too, can not do. Below we look at the debuggers for Windows, and in the next paragraph we will pay attention to the famous GDB. So, let's go:



2.d gdb



2.e DBI


Programmable debugging is today an essential approach in the arsenal of any reverser. And DBI is one of the tools. More details:



2.f SMT


What is SMT solver? In short, an SMT solver is a program that can solve logical formulas.


The basic idea of ​​using SMT in the field of software security is to translate a program code or algorithm into a logical formula, and then use a SMT solver to check one or another property of this code.


In other words, SMT provides a mathematical tool for semantic code analysis.
SMT solvers have been used in our field for quite some time. They are well established for the following tasks:



During this time, SMT lost the aura of mystery, more or less working tools for “ordinary” people appeared.


Below are sources that will help to plunge into the topic:



2.g Python for Automation


Today, without basic knowledge of Python, it will be very difficult, because this programming language is considered the most popular means for automating various tasks in the field of information security (and not only). In addition, it is used in various utilities (for example, all the above utilities allow you to add functionality with the help of this PL):



2.h BAF (Binary Analysis Frameworks)


For a bit more advanced, we recommend paying attention to whole frameworks, which in their composition use the previously mentioned mechanisms and analysis tools for solving more complex problems. So, here they are:



Some interesting frameworks / tools:



3. Architecture


We will cover only a few popular architectures. At the end of the article in the section with additional materials you will find information on many others (MIPS, PowerPC, etc.).


3.a x86-x86_64



3.b ARM



4. OS


Knowledge of the principles of work of popular Operating Systems.


4.a Windows



4.b Linux



4.c Mac OS (OSX) / iOS



4.d Android



5. Executable file formats


This section provides links explaining the details of popular executable file formats.


5.a PE



5.b ELF



5.c mach-o



The famous researcher corkami makes very useful and interesting "posters" with the scheme of various file formats, including those mentioned above. We recommend using them as a cheat sheet. A utility Kaitai Sctruct will help in the analysis.


6. Programming


One of our friends once said that a good reverser is 80% a good programmer. The ability to program and understand what is being done and why simplifies the process of researching someone else's program. Therefore, without programming in the reverse nowhere. And of course, the automation of routine tasks, as you probably already understood, is a very useful thing;)


6.a C / C ++



6.b ASM



7. Practice


This section provides links to virtual machines and online resources to practice.


7.a War Games



And finally, a few links with a large number of materials on the above topics:



')

Source: https://habr.com/ru/post/334832/


All Articles