A while back, we had a thread for reverse engineering. It was a great thread and would like to learn more and I'm sure others might be interested in getting into this.
Discuss resources and projects to get learning so it can be compiled into a sticky.
Ps4's security coprocessor made by AMD specifically for handling all crypto (known as SAMU) has no known hardware or software vulnerabilities but does have a flag where in which you, as kernel, can ask it to decrypt things I to their unsigned form.
This includes but is not limited to, update files, game packages, loose files from the game package, system modules, and basically everything except the ability to dump the keys used by SAMU.
Nolan Miller
cute
Matthew Young
do you still have the number of this thread?
Ryan Robinson
bumping for PUSHAD
Oliver Morales
What new features does IDA 7.0 bring? Is it worth updating from 6.x?
Adam Rogers
I'll find it.
Landon Parker
I'd like to learn this. I know about tools like Wireshark, Cheat Engine, IDA Pro, and so on, but I can't really handle any complicated, deep reverse engineering. Shit like bypassing GameGuard for example. How do people do things like this?
Mason Taylor
Don't you basically need to know assembly before you can hope to do reverse engineering?
Part of a club in my Uni where we're all learning how to reverse engineer. Currently starting on well documented systems for practice. Write now working with the 8080 processor.
Kayden Ramirez
I'd dick that robot
David Parker
Too cute Please don't lewd
Samuel Clark
...
Grayson Allen
I noticed a lot of small bugs I kept running into were fixed from 6.8, besides that I haven't really noticed anything new. Retdec apparently only works on 6.8 though, still haven't gotten to try it yet since I don't really feel like downgrading, supposedly it can give better results than HexRays though: retdec.com/
Xbone has the same kinda thing known as the SP, also sadly in the same boat with no known vulnerabilities + no way to dump keys... I heard there was an AMD PSP exploit revealed a few days ago though, I wonder if that could apply to these - doubtful though since it seems MS/Sony are running their own custom code instead of AMDs stuff.
Juan Bell
Bumping for resources to learn from.
William Bailey
Reverse engineering is really cool, but I just don't have the time for this now. I came by and thought that I'd share this book here: beginners.re This is where I'd start learning RE. I also think that reverse engineering should be an elective course for all CS students.
Dylan Stewart
Thank you! This looks great!
Benjamin Gray
Depends on what you want to reverse engineer. You don't need to know programming if you want to reverse engineer a TV remote. You don't need to know assembly if you want to reverse engineer Java application, you just need to know how JVM works (not even in detail like the performance gurus do). RE course would be redundant, you learn what is required to do RE in standard undergrad. Also most courses about security give you projects that have you do some RE- our project involved constructing a particularly nasty ROP chain on a specific CISCO box.
Jacob Evans
I know nothing about reverse engineering, but I imagine you guys might appreciate this: gcc.godbolt.org/ .
Jackson Adams
When it comes to reverse engineering hardware such as CPUs and consoles. What languages are generally used?
Benjamin Jenkins
Why do the good threads go to waste?
Xavier Bennett
If you want to learn how to reverse engineer, first learn computer architecture and (obviously) programming, C and Python are pretty much mandatory. x64dbg is a magnificent open source tool for Windows, and I can recommend gdb-peda and radare2 for linux.