background preloader

Virt hooking

Facebook Twitter

API Monitor: Spy on API Calls and COM Interfaces (Freeware 32-bit and 64-bit Versions!) API Monitor API Monitor v2 is currently in Alpha.

API Monitor: Spy on API Calls and COM Interfaces (Freeware 32-bit and 64-bit Versions!)

Installers for both 32-bit and 64-bit versions are now available. Download Now. Save Capture and Monitor Metro apps using the latest release, which includes 2500 new API’s. More information and screenshots API Monitor is a free software that lets you monitor and control API calls made by applications and services. IMAGES VirtualBoxes – Free VirtualBox® Images. We provide pre-built images for several open-source operating systems.

IMAGES VirtualBoxes – Free VirtualBox® Images

Please note that: Every image contains the latest software as of the day the image was built. Performing updates is on your own, and may require looking for documentation to read using your favourite search engine.Default usernames and passwords, where required, can be found next to the download link of each image. You are warmly invited to create your own user, or at least to change passwords, if you intend to use the images in a public environment. Special purpose images. GNU/Linux (GNU userland tools running on top of the Linux kernel) GNU/OpenSolaris (GNU userland tools running on top of the OpenSolaris kernel) OpenSolaris (website).Nexenta (website): the installation is done from the CD.MILAX(website): the installation has been done from the official ISO image. Cuckoo Sandbox. VirSCAN.org - Free Multi-Engine Online Virus Scanner v1.02, Supports 36 AntiVirus Engines!

Android Reverse Engineering (A.R.E.) Malwares on mobile system are increasing dramatically, especially on android smartphone system, this week Trendmicro security lab posted about new campaign targeting this system by infecting users over web applications (One-Click Billing Fraud Scheme Through Android App Found).

Android Reverse Engineering (A.R.E.)

After infecting the smartphone with ANDROIDOS_FAKETIMER some information will be sent to certain URL’s on the web, the information includes Gmail account, Sim information and mobile number. This is not the first case reported by Trendmicro there are previous similar attacks that are targeting Android. If you are interested in reversing android malware than you can check Android Reverse Engineering (A.R.E.) Virtual Machine, all you need is to install virtualbox and download the available image on website. MART - Malware Analyst Research Toolkit: Cuckoo Sandbox. When I analyze potentially malicious software I use a collection of tools which I now decided to give a name: MART which stands for Malware Analyst Research Toolkit.

MART - Malware Analyst Research Toolkit: Cuckoo Sandbox

It consists of several components which I will explain over a series of blog posts in the near future. The process looks something like this:Sample acquisitionSample analysisSample reporting The second piece of MART is sample analysis. About - QEMU. Debugging-with-qemu. API Hooking tool injecting code in the PE: tool explanation and application examples.. Hello again..

API Hooking tool injecting code in the PE: tool explanation and application examples..

There was a long time since my last post, cos i was busy with several issues, but most time with this tool.. Checking it’s operation, testing the hooked PE in different OSs, changing the method used, etc.. Finally i came up with this tool, and below i will explain exactly how it works, give you the source code and a binary, and show you some applications of this tool with video and/or shots… This is an API hooking tool, which uses the PE IAT patch method, and runs the payload, injecting the code in the PE permanently, changing the PE Header apropriately (section sizes, OEP, ..)

Pin - A Dynamic Binary Instrumentation Tool. Overview Pin is a dynamic binary instrumentation framework for the IA-32 and x86-64 instruction-set architectures that enables the creation of dynamic program analysis tools.

Pin - A Dynamic Binary Instrumentation Tool

Some tools built with Pin are Intel Parallel Inspector, Intel Parallel Amplifier and Intel Parallel Advisor. The tools created using Pin, called Pintools, can be used to perform program analysis on user space applications in Linux and Windows. As a dynamic binary instrumentation tool, instrumentation is performed at run time on the compiled binary files. Thus, it requires no recompiling of source code and can support instrumenting programs that dynamically generate code. Dynamic Binary Instrumentation в ИБ / Блог компании Digital Security. Сложность программного обеспечения растет – программы становятся более динамическими, и их поведение возможно оценить только в процессе выполнения.

Dynamic Binary Instrumentation в ИБ / Блог компании Digital Security

Производить оценку безопасности (поиск уязвимостей, недокументированных возможностей и т.д.) таких приложений значительно сложнее. Использовать только статические подходы анализа становится невозможным, так как из-за динамически генерируемого кода мы даже не можем гарантировать полное покрытие кода при анализе. На помощь приходят динамические методы анализа. Есть такая замечательная технология, как динамическая бинарная инструментация (Dynamic Binary Instrumentation, DBI), которая заключается во вставке в бинарный исполняющийся код анализирующих (в общем случае) процедур.

Основная прелесть данного подхода заключается в том, что нет необходимости в исходном коде анализируемого приложения – работа происходит непосредственно с бинарным файлом. Инструментацией называют процесс модификации исследуемой программы с целью ее анализа. Neuroo/runtime-tracer. DynamoRIO Dynamic Instrumentation Tool Platform. Corelabs site. Title Dynamic Binary Instrumentation Frameworks: I know you're there spying on me Authors Nahuel Riva and Francisco Falcón In REcon 2012 Conference, Date published Keywords binary instrumentation, vulnerability research,

Corelabs site

An Anti-Reverse Engineering Guide. Download source code - 4.87 KB Table of Contents Introduction In my previous article, I gave a short introduction into some Anti-Debugging/Debugger Detection techniques that primarily involved the use of Win32 API functions.

An Anti-Reverse Engineering Guide

In this article, I plan to travel a bit deeper into the interesting world of reverse engineering and explore some more intermediate level techniques for annoying reverse engineers. Some comments in my previous article noted that the techniques I presented could, and are most of the time, easily bypassed by intermediate level reversers; one statement I would like to make is that there is an ongoing battle between the coders who develop programs that protect against cracking and reverse engineering and the engineers themselves. Valgrind Home. The Cliffs of Inanity › Valgrind and GDB. Valgrind 3.7.0 now includes an embedded gdbserver, which is wired to the valgrind innards in the most useful way possible.

The Cliffs of Inanity › Valgrind and GDB

What this means is that you can now run valgrind in a special mode (simply pass --vgdb-error=0), then attach to it from gdb, just as if you were attaching to a remote target. Valgrind will helpfully tell you exactly how to do this. Then you can debug as usual, and also query valgrind’s internal state as you do so. Valgrind will also cause the program to stop if it hits some valgrind event, like a use of an uninitialized value. For example, consider this incorrect program, e.c: Address-sanitizer - fast memory error detector. Vagrant - Virtualized development for the masses.