Bootloader to Iris: A Security Teardown of a Hardware Wallet
https://hhj4ck.github.io/en/iris-wallet-security-teardown.html
@reverseengine
https://hhj4ck.github.io/en/iris-wallet-security-teardown.html
@reverseengine
Guanxing’s Blog
Bootloader to Iris: A Security Teardown of a Hardware Wallet
Recently, I got my hands on a hardware wallet that features iris recognition as a selling point. The novelty of the iris component sparked my curiosity, so I decided to take a deep dive into its implementation. Since the wallet’s hardware and software design…
❤1
Malware Development Evading Diaries
NTFS Files Attributes:
FuncIn
Code Cave
Stolen Certificate
Redirect Antivirus Website Evading Techniques:
Shortcut Hiding
Disabling Antivirus
Adding Antivirus Exception
Fake Signature
Mark-Of-The-Web (MOTW) Bypass
Return Address Spoofing
Runtime Function Decryption
DLL Unhooking
How DLL Unhooking works
Unhooking Strategies
Evasion Using Direct Syscalls
Key Aspects of This Technique
Operational Mechanis
Featured Windows APIs
Unloading Module With FreeLibrary
Operational Overview
Key Aspects of This Technique
Featured Windows APIs
References
@reverseengine
NTFS Files Attributes:
FuncIn
Code Cave
Stolen Certificate
Redirect Antivirus Website Evading Techniques:
Shortcut Hiding
Disabling Antivirus
Adding Antivirus Exception
Fake Signature
Mark-Of-The-Web (MOTW) Bypass
Return Address Spoofing
Runtime Function Decryption
DLL Unhooking
How DLL Unhooking works
Unhooking Strategies
Evasion Using Direct Syscalls
Key Aspects of This Technique
Operational Mechanis
Featured Windows APIs
Unloading Module With FreeLibrary
Operational Overview
Key Aspects of This Technique
Featured Windows APIs
References
@reverseengine
❤5
❤1
Reversing Microsoft Defender's Signatures for Evasion
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
@reverseengine
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
@reverseengine
❤1
Exploiting Windows Kernel
CVE-2023–28218
https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218
@reverseengine
CVE-2023–28218
https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218
@reverseengine
theori.io
Exploiting Windows Kernel Wild Copy With User Fault Handling (CVE-2023–28218) - Theori BLOG
At Hexacon 2023, we presented our Windows kernel security research, uncovering CVE-2023-28218, a heap overflow in afd.sys. Read our exploit analysis and methodology. | Vulnerability Research
❤1
Hypervisors for Memory Introspection and Reverse Engineering
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
@reverseengine
https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html
@reverseengine
secret club
Hypervisors for Memory Introspection and Reverse Engineering
Introduction
❤1
Ghidra Bare Metal Frimware Analysis
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra
@reverseengine
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra
@reverseengine
Attify Blog - IoT Security, Pentesting and Exploitation
Ghidra bare metal firmware analysis
Reverse engineering firmware binaries often entails going through the datasheet, compiler headers to set up the base address and memory map correctly.
❤1