[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

https://github.com/JonathanSalwan/T riton does /g/ do any l

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 6
Thread images: 4

File: CFG.png (106KB, 1980x830px) Image search: [Google]
CFG.png
106KB, 1980x830px
https://github.com/JonathanSalwan/Triton

does /g/ do any low level analysis/bug hunting for exploit writing? any reversers out there? lets get a reversing thread going.
>>
File: 1443377708131.jpg (306KB, 1280x960px) Image search: [Google]
1443377708131.jpg
306KB, 1280x960px
slightly shameful self bumpppppppp
>>
>>57115768
Hint: don't bother discussing anything interesting in /g/

https://reddit.com/r/ReverseEngineering/
>>
File: 1450479925266.gif (130KB, 437x430px) Image search: [Google]
1450479925266.gif
130KB, 437x430px
>>57115831
yea, well ive seen a few good thread on /g/ before about things related to software security, just gotta hope to get some people in here
>>
Retired reverser here.

Didn't actually do a lot of exploit discovery or development. Most of those are initially found via fuzzing these days. There were some adversarial (black box) audits however those were rare.

My clients were far more frequently not the creators of what I was working on: if source were available, they probably wouldn't have been contracting a reverse-engineer at my rates!

Of course that may be the direction the field is taking more recently. Many software reversers in the security arena had a focus on malware and worked for antivirus labs, or for firms in similar arenas.

I worked with some great people in the hardware side.
>>
File: gucci sauce.jpg (78KB, 720x720px) Image search: [Google]
gucci sauce.jpg
78KB, 720x720px
>>57116021
Interesting stuff. To my understanding most of vulnerability research these days is all about satisfiability. Any insights into the world of satisfiability? or even fuzzing for that matter?
Thread posts: 6
Thread images: 4


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.