Blog

Automated RE of Kernel Configurations

Kconfig (short for kernel configuration) is a component of the the Kbuild build system for the Linux kernel. The Linux kernel is highly customizable, and configuration is required to build the kernel and generate kernel headers. In this blog post, I am introducing a new Binary Ninja plugin that analyzes Linux kernel binaries to recover…

Sploit – Binary Analysis and Exploitation with Go

Sploit is a Go package that aids in binary analysis and exploitation. In this blog post, I describe some of the core features of sploit and how it can be used for capture the flag as well as practical reverse engineering and exploit development. Introduction to Sploit I decided to create sploit to invest in…

Crash Harnessing with Injected Code

There are many approaches to harnessing programs and instrumenting them for crash analysis and memory profiling. Each technique has benefits and drawbacks. Emulation is often the most reliable method, but requires the largest sacrifice in performance. Specialized hardware such as modern Intel processors can provide code coverage, but doesn’t necessarily provide the ability to profile…


Follow My Blog

Get new content delivered directly to your inbox.