<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on Cutaway Security</title><link>https://www.cutawaysecurity.com/tags/reverse-engineering/</link><description>Recent content in Reverse Engineering on Cutaway Security</description><generator>Hugo -- gohugo.io</generator><language>en</language><lastBuildDate>Fri, 06 Mar 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://www.cutawaysecurity.com/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>Learning Ghidra Basics Analyzing Firmware</title><link>https://www.cutawaysecurity.com/blog/learning-ghidra-basics-analyzing-firmware/</link><pubDate>Fri, 06 Mar 2020 00:00:00 +0000</pubDate><guid>https://www.cutawaysecurity.com/blog/learning-ghidra-basics-analyzing-firmware/</guid><description>&lt;h2 class="relative group">Introduction
 &lt;div id="introduction" class="anchor">&lt;/div>
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none">
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#introduction" aria-label="Anchor">#&lt;/a>
 &lt;/span>
 
&lt;/h2>
&lt;p>It has been a while since I have analyzed any program or firmware. The majority of my previous experiences were mostly analyzing Capture The Flag (CTF) binaries with the help and instruction from my good friend &lt;a href="https://www.grimm-co.com/about/matt-carpenter" target="_blank" rel="noreferrer">Matt Carpenter&lt;/a> of &lt;a href="https://www.grimm-co.com" target="_blank" rel="noreferrer">Grimm Security&lt;/a>. While extremely helpful, I always knew I was looking for a vulnerability that should be easy to find since I mainly stuck with the easy to medium difficulty challenges. Analyzing actual firmware for a vulnerability is much different. While most programs &amp;ldquo;should” have vulnerabilities, there is no guarantee of a flag at the end, like in CTF binaries, that can be verified by submitting a string of bytes for points.&lt;/p></description></item></channel></rss>