877.791.9571 |

About the Author:

Soufiane Tahiri is is an InfoSec Institute contributor and computer security researcher, specializing in reverse code engineering and software security. He is also founder of www.itsecurity.ma and practiced reversing for more then 8 years. Dynamic and very involved, Soufiane is ready to catch any serious opportunity to be part of a workgroup. Contact Soufiane in whatever way works for you: Email: soufianetahiri@gmail.com Twitter: https://twitter.com/i7s3curi7y LinkedIn: http://ma.linkedin.com/in/soufianetahiri Website: http://www.itsecurity.ma
windows-phone-09262013_r1_c1

Windows Phone digital forensics

Abstract

Abbreviated as WP, Windows Phone is a new Smartphone operating system developed by Microsoft in order to succeed the old Windows Mobile. This “new” operating system may potentially be […]

windows-phone-09262013

Windows Phone digital forensics

Abstract

Abbreviated as WP, Windows Phone is a new Smartphone operating system developed by Microsoft in order to succeed the old Windows Mobile, and this “new” operation system will be […]

patternLock08192013

Android Forensics: Cracking the Pattern Lock Protection

Introduction

In this paper I’ll show you how to find an Android’s user pattern lock. I assume that the technique that I’ll demonstrate can work only on a rooted device. […]

steganography08142013

Steganography: What your eyes don’t see

Steganography is the art of hiding information to prevent detection of a hidden message. It has been used throughout history by many methods and variation, ancient Greeks shaved heads […]

Obfuscated-Assemblies-feature

Reverse Engineering Obfuscated Assemblies

In previous articles that talked about .NET reverse engineering, we covered almost every aspect of reversing .NET assemblies, we explained how this kind of binary is compiled, executed, how […]

Google Hacking

Google Hacking: The hidden face of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the […]

Dot NET Assemblies and Strong Name Signature

Dot NET Assemblies and Strong Name Signature

General Overview

Before going any deeper on this subject, we need to clarify a huge ambiguity regarding signing for versioning and signing for protecting.

A strong name signature is after all […]

reverse-engineering-sized

Demystifying dot NET Reverse Engineering: Advanced Round-trip Engineering

Before going through this article, I highly advice you to read all previous ones in the series since I will not re-explain some techniques and re-describe some tools previously […]

reverse-engineering-sized

Demystifying dot NET reverse engineering: Introducing Round-trip engineering

Introduction

After covering the basics of dot NET reverse engineering in first articles (refer to the references), it’s time to go more in depth of the dot NET MSIL assembly […]

net.png

Demystifying dot NET reverse engineering – PART 3: Advanced Byte Patching

Introduction

In the first two parts, we saw some basics that will let you reverse-engineer some dot NET applications; we covered the concepts of dot NET compilation, we presented Microsoft Common […]

Abstract background with binary code.

x86 Assembly Language Applicable To Reverse Engineering: The Basics – Part 2

For part 1 of this series, please click here.

Introduction

We saw in the first article an introduction to the most common x86 assembly instructions seen when it comes to disassembling […]

net.png

Demystifying dot NET reverse engineering – PART 2: Introducing Byte Patching

For part 1 of this series, please click here.

Introduction

We covered in the first part the very basics regarding dot NET programs, how they are compiled (which we will see […]

net.png_r2_c2

Demystifying Dot NET Reverse Engineering, Part 1: Big Introduction

DISCLAIMER

This, and all upcoming parts, are made with a strict and pure educational purpose just to gain insights into dot NET programs. What you’re going to do with this […]

Abstract background with binary code.

x86 Assembly Language Applicable To Reverse Engineering: The Basics – Part 1

Overview

The x86 Assembly language or ASM is the lowest-level programming language understood by human kind and one of the most primitive ones; it can be described as machine language. […]

most-influential-software-programmers-of-all-time

Three Ways to Defeat a ReverseMe

Introduction

What is a « ReverseMe »?

Disassembling or debugging commercial programs is usually prohibited by international laws. When practicing reversing and when we need to study a kind of software protection, reverse engineers […]

anti-virus-Copy_r1_c1

Antivirus Evasion: The Making of a Full, Undetectable USB Dropper / Spreader

Some Basics and Overview

Usually when we talk about bypassing antivirus software, and especially when we talk about antivirus programs like NOD32, Kaspersky, BitDefender… We automatically think about deep coding […]

most-influential-software-programmers-of-all-time

How to Break Simple Software Protections

Some software developers are really lazy when it comes to protecting their products, and in some cases, the protection they implement (just like most “infamous” softwares) is really easy […]