Kconfig (short for kernel configuration) is a component of the the Kbuild build system for the Linux kernel. The Linux kernel is highly customizable, and configuration is required to build the kernel and generate kernel headers. In this blog post, I am introducing a new Binary Ninja plugin that analyzes Linux kernel binaries to recover … Continue reading Automated RE of Kernel Configurations
Sploit is a Go package that aids in binary analysis and exploitation. In this blog post, I describe some of the core features of sploit and how it can be used for capture the flag as well as practical reverse engineering and exploit development. Introduction to Sploit I decided to create sploit to invest in … Continue reading Sploit – Binary Analysis and Exploitation with Go
There are many approaches to harnessing programs and instrumenting them for crash analysis and memory profiling. Each technique has benefits and drawbacks. Emulation is often the most reliable method, but requires the largest sacrifice in performance. Specialized hardware such as modern Intel processors can provide code coverage, but doesn’t necessarily provide the ability to profile … Continue reading Crash Harnessing with Injected Code
Follow My Blog
Get new content delivered directly to your inbox.