mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.


Administered by:

Server stats:


#idapro

0 posts0 participants0 posts today

𝗞𝗮𝗹𝗺𝗮𝗿𝗖𝗧𝗙 𝟮𝟬𝟮𝟱 𝗶𝘀 𝗷𝘂𝘀𝘁 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝗰𝗼𝗿𝗻𝗲𝗿 - 𝗰𝗼𝗺𝗲 𝗰𝗼𝗺𝗽𝗲𝘁𝗲 𝘄𝗶𝘁𝗵 𝘁𝗵𝗲 𝗯𝗲𝘀𝘁 𝗰𝗼𝗺𝗽𝗲𝘁𝗶𝘁𝗶𝘃𝗲 𝗵𝗮𝗰𝗸𝗲𝗿𝘀 𝗳𝗿𝗼𝗺 𝗮𝗿𝗼𝘂𝗻𝗱 𝘁𝗵𝗲 𝘄𝗼𝗿𝗹𝗱 𝗮𝗻𝗱 𝘄𝗶𝗻 𝗴𝗿𝗲𝗮𝘁 𝗽𝗿𝗶𝘇𝗲𝘀!

The #KalmarCTF 2025 is on the horizon, and Kalmarunionen is ready to raise the bar once again. Mark your calendars for March 7th - 9th, 2025, and gear up for a 48-hour showdown of skill, and pure CTF grit.

𝐇𝐞𝐫𝐞’s 𝐰𝐡𝐚𝐭’s 𝐢𝐧 𝐬𝐭𝐨𝐫𝐞:
With a generous nod to @HexRaysSA for making the coveted #IDAPro licenses possible, we promise an unforgettable event brimming with complex challenges in binary exploitation, reverse engineering, and other classic #CTF categories.

🥇 First Place: 3x IDA Pro Named Licenses* with 2 Decompilers each
🥈 Second Place: 2x IDA Pro Licenses* with 2 Decompilers each
🥉 Third Place: 1x IDA Pro License* with 2 Decompilers

Why join hashtag #KalmarCTF 2025?
- Test yourself against top global teams and except some fun and original challenges
- Immerse yourself in a thriving community of passionate CTF players and hackers.

If you’re ready to push your limits, claim your glory, and maybe take home some serious #HexRays loot, head over to KalmarC.TF for all the details.
REassemble your dream team, and lets see who takes all home the licenses this year.

The fourth article (126 pages) of the Exploiting Reversing Series (ERS) is available on:

exploitreversing.com/2025/02/0

I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays (@HexRaysSA on X) for their constant and uninterrupted support, which have helped me write these articles.

The fifth article (ERS 05) will be released soon. Stay tuned.

I hope you enjoy reading it and have an excellent day.

#apple#ios#macOS

The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

exploitreversing.com/2025/01/0

I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

Have a great day.

Apparently, @HexRaysSA is finally going down the drain. Their whole new licensing process does not work, support sucks, i'm currently just burning money 💸every day for not being able to work on my project. This is not the toolchain I'd like to depend on anymore. Probably it's time to say good-bye, after > 20 years of being user and mentor of IDA Pro & Co. #hexrays #idapro #RE

#Nimfilt has been updated to work with the API changes in the newly released #IDAPro 9.0 (while keeping it backwards-compatible with IDA 8.X)
+ more strings should now be properly typed and named!

github.com/eset/nimfilt

For other plugin/script writers: the #IDAPython documentation and the porting guide are still contradicting each other in places...🤦 It seems like the porting guide is more up-to-date, but YMMV

GitHubGitHub - eset/nimfilt: A collection of modules and scripts to help with analyzing Nim binariesA collection of modules and scripts to help with analyzing Nim binaries - eset/nimfilt

The second article in our new series on #Windows #kernel #driver #vulnerability research and #exploitation is out!

Exploiting #AMD atdcm64a.sys arbitrary pointer dereference - Part 2:
security.humanativaspa.it/expl

This time, @ale98 covers how to craft PoCs for the arbitrary MSR read and arbitrary pointer dereference vulnerabilities described in his previous article, with step-by-step advice for debugging with #IDAPro.

Enjoy... and stay tuned for the third and last article next week.

hn security · Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 2 - hn securityWelcome back! We concluded the previous […]