Ringzer0 · @ringzer0
152 followers · 192 posts · Server infosec.exchange

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with Joxean Koret’s (@joxean) on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

#BinaryDiffing #infosec #training #diaphora

Last updated 2 years ago

aegilops :github::microsoft: · @aegilops
102 followers · 330 posts · Server fosstodon.org

@joxean The order they are called in is a good heuristic, but you probably have enough information to match code structures beyond that.

You would need to use the basic block structure of the caller to differentiate call sites, since "first" is only trivial in a linear function with no branches.

You're decompiling, which should allow you to match the call sites in the AST or an intermediate representation (IR), independent of the arch.

#ast #ir #BinaryDiffing #basicblock

Last updated 2 years ago

aegilops :github::microsoft: · @aegilops
102 followers · 330 posts · Server fosstodon.org

@joxean I think a fine-grained callgraph including call site information would break this tie.

Match the call sites in the two binaries, using instruction-level comparisons. You can then differentiate between the two call edges, based on which call site they are from.

#BinaryDiffing #callgraph #Diaphora

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1435 followers · 11889 posts · Server mastodon.social

RT @_ringzer0@twitter.com

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with Joxean Koret’s (@matalaz@twitter.com) on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#BinaryDiffing #training #Diaphora

Last updated 2 years ago

Ringzer0 · @ringzer0
138 followers · 147 posts · Server infosec.exchange

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with Joxean Koret’s (@joxean) on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

#BinaryDiffing #training #diaphora

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1057 followers · 11004 posts · Server mastodon.social

RT @_ringzer0@twitter.com

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with @matalaz@twitter.com’s training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#BinaryDiffing #Diaphora

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1434 followers · 11890 posts · Server mastodon.social

RT @_ringzer0@twitter.com

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with @matalaz@twitter.com’s training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#BinaryDiffing #Diaphora

Last updated 2 years ago

Ringzer0 · @ringzer0
74 followers · 36 posts · Server infosec.exchange

πŸ‘€ Does all binary code look the same to you? Upgrade your skills and automate your diffing tasks with @joxean’s training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

#BinaryDiffing #diaphora

Last updated 2 years ago

hardik05 · @hardik05
90 followers · 8 posts · Server infosec.exchange

If you are interested in , checkout this video.
youtu.be/gb02dzgHBeU

#BinaryDiffing

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1057 followers · 11004 posts · Server mastodon.social

RT @_ringzer0@twitter.com

πŸ‘€ Can’t spot the difference? Upgrade your skills and automate your diffing tasks with @matalaz@twitter.com's training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

🧡 6/10

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#BinaryDiffing #Diaphora

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1434 followers · 11890 posts · Server mastodon.social

RT @_ringzer0@twitter.com

πŸ‘€ Can’t spot the difference? Upgrade your skills and automate your diffing tasks with @matalaz@twitter.com's training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

🧡 6/10

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#BinaryDiffing #Diaphora

Last updated 2 years ago

Ringzer0 · @ringzer0
75 followers · 36 posts · Server infosec.exchange

πŸ‘€ Can’t spot the difference? Upgrade your skills and automate your diffing tasks with Joxean Koret’s training on Advanced Binary Diffing with !

🎟️ ringzer0.training/trainings/ad

🧡 6/10

#BinaryDiffing #diaphora

Last updated 2 years ago

Joxean Koret (@matalaz) · @joxean
1056 followers · 11008 posts · Server mastodon.social

RT @_ringzer0@twitter.com

Register now for advanced training in beginning Feb 1 at
πŸ‘‡πŸ‘‡
>>Reverse Engineering w/ by @0xJeremy@twitter.com
>> Reverse Engineering by @jensensec@twitter.com
>>Advanced w/ by @matalaz@twitter.com

ringzer0.training/

πŸ¦πŸ”—: twitter.com/_ringzer0/status/1

#reverseengineering #Unlock2021 #ghidra #rtos #BinaryDiffing #Diaphora

Last updated 4 years ago