Showing 12 posts by Fernando Domínguez Delgado

Return Home

In this post I will analyze one on the ELF files captured on my honeypot. First, a dynamic analysis will be performed. Once we aknowledge it's behaviour we will move onto a more in-deep static analysis. Let's start! We are presented with a 32-bit ELF un-stripped executable. $ file 05fd293845e7517bcfc6e8a7fa845ef101bf716c5ec6d40c74c6f7e8aed656bf 05fd293845e7517bcfc6e8a7fa845ef101bf716c5ec6d40c74c6f7e8aed656bf:

Read More

Today I came across this post that states that it is not possible to get a hard-coded password out of a binary by using the strings command. But a while back I also remember reading another article saying that it is indeed possible. So, is it? I grabbed the code

Read More

Notice: This post does not endorse piracy. It's purpose is merely educational. Decompiling and cracking software is illegal in most cases. OS X native software is written in Objective-C, a superset of C which is not very hard to hack away. In this post I will try to demonstrate the

Read More