Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "ida"
-
The best software license ever seen :
my patches and additions on top of Ian's code are licensed under the ABSE ("Anyone But Stefan Esser") license.
note that an additional exception to the license is added, forbidding use/redistribution of said content to his
trainees as well, but only when in a 5 mile radius from "Stefan Esser" or while holding any sort of (video)conference/chat with him.
note that this license will only be used as long as what would capstone decode / that one other arm64 ida
plugin thing by i0n1c ("Stefan Esser") are not under the MIT license.
afterwards, all exceptions are cleared and basically WTFPL applies
if you need a copy of the rest of the license feel free to google it or something.3 -
How to reverse engineer without knowing how to reverse engineer:
1.Open IDA pro
2. Hit shift+f12 for the strings view
3. Choose an interesting string
4. Hit x and go over the xrefs
5. You are now earning at least $140K a year.
Bonus: say that you can code html2 -
Apple must have people really good at IDA Pro macOS masks the uname -a string perfectly. Side note: macOS is the best Linux distro.7
-
Had to track down IDA 5.0 today because I need to decompile a DOS program and DOS' included debugger wasn't cutting it. (Related note: If anyone has a copy of SOURCER, mind sharing?)2
-
I was introduced to disassembly/reverse engineering today. It's amazing how many production applications use isLicenseValid() or other helpful function signatures to assist in my practical learning :p I'm looking at you sublime text
-
Bitcoin malwares are everywhere.
The hard part is doing reverse engineering and wondering why its feeding on only top of the stack in assembly
Edit: Using IDA Pro -
While ill started with some hack the box challenges. Really addictive stuff. For one opened binary in IDA and changed one assembly instruction to obtain the flag. Felt like a hacker. - lasted only till next challengr3
-
So apparently people use IDA over Ghidra still.
Either they're paying thousands a year for the privelege or they've got a cracked version. Either way, you're getting shafted. (Pirated IDA databases can't be loaded in legit copies, so forget community sharing without exporting shit, and IDA is confused by jumps in anything half the time. Pirated IDA also often has issues with plugins and mods and such.
Why are you people like this?3 -
sorry hexrays, making "IDA Home" completely useless? this ain't it, chief.
https://twitter.com/marcan42/...3 -
Reverse engineering with IDA, be like:
Ow that makes sense, lets jmp there, nope thats not... aaah this must be the subroutine I was lookig for, nope thats not it, repeat.