پاک کردن واقعی True Deletion
پاک کردن واقعی تو ردزون یعنی چی
تو ردزون فقط این مهم نیست که چی میریزید رو هارد مهم ترش اینه که چی باید از بین بره که هیچ اثری ازش نمونه پاک کردن واقعی همون چیزیه که باعث میشه ریورس کاز حرفهای با فرق از آماتور شناخته بشه
چی باید حذف بشه
اهداف میانی ابزارهای مصرفی
اینها همون چیزایی ان که تو مسیر عملیات درست میشن:
فایلهای خروجی ابزارها
اسکریپتهای موقتی
DLL
های تزریقی
config
های تست
فایلهایی که فقط برای یک مرحله استفاده شدن
اینها اگه بمونن = هم لو رفتن عملیات هم باگ امنیتی
مشکل اصلی اینجاست: Windows پاک نمیکنه فقط unlink میکنه
وقتی یه فایل Delete میکنید فقط از جدول فایلها حذف میشه اما بیشتر حجم اطلاعات تو دیسک میمونه یعنی با Forensics راحت قابل ریکاوریه
پاک کردن واقعی یعنی:
پاک کردن Metadata
پاک کردن محتوا Overwriting
پاک کردن اثرهای Cached
پاک کردن Prefetch + EventLogs بعضی سناریو ها
روشهای پاک سازی
Overwrite امن
یعنی داده قدیمی با صفر/رندوم باز نویسی بشه تا برنگرده
خیلیا فکر میکنن 7-pass یا 35-pass لازمه نه!
روی SSD یک پاس رندوم هم معمولا کافیه
حذف log های بی اثر غیرسیستمی
مثلا لاگهای لوکال ابزارهایی که خودتون اجرا کردید نه سیستم
اینکار برای پاک کردن کار های خودتون طبیعی و امنه
Memory Cleanup
خیلیا حواسشون نیست ولی artifact های زیر توی RAM میمونن:
کلیدهای crypto مصرفی
بایت کد ابزار
Buffer
های network
دادههای حساس
پاک کردن حافظه یعنی:
بستن پروسه ها
پاک کردن Handle ها
Zero
کردن buffer های حساس
چیا معمولا جا میمونه؟
و باعث لو رفتن ابزار میشه
Artifact
های PowerShell History
Temp folderها
فایلهای Extract شده از Zip
Jump Listها Recent Items
Prefetch
Crash dumpها
registry keys مرتبط با ابزار یا اجرا
اینها 90٪ مواقع باعث لو رفتن میشن
True Deletion
What does true deletion mean in Redzone
In Redzone, it's not just about what you put on the hard drive, it's more important that what needs to be removed so that no trace of it remains. True deletion is what makes a professional reverse engineer different from an amateur.
What needs to be deleted
Intermediate goals of consumer tools
These are the things that are created along the way:
Tool output files
Temporary noscripts
Injected DLLs
Test configs
Files that are only used for one step
If these remain = both the operation and the security bug
The main problem here is: Windows does not delete, it only unlinks
When you delete a file, it is only deleted from the file table, but most of the information remains on the disk, which means it can be easily recovered with Forensics
True deletion means:
Erasing Metadata
Erasing content Overwriting
Clearing Cached traces
Clearing Prefetch + EventLogs Some scenarios
Clearing methods
Safe overwrite
That means overwriting old data with zero/random so that it doesn't come back
Many people think that 7-pass or 35-pass is not necessary!
On SSD, a random pass is usually enough
Delete ineffective non-system logs
For example, local logs of tools that you run yourself, not the system
This is normal and safe for clearing your own work
Memory Cleanup
Many people don't pay attention, but the following artifacts remain in RAM:
Used crypto keys
Tool bytecode
Network buffers
Sensitive data
Clearing memory means:
Closing processes
Clearing handles
Zeroing sensitive buffers
What usually remains?
And it causes tool leaks
Artifacts
PowerShell History
Temp folders
Files extracted from Zip
Jump Lists
Recent Items
Prefetch
Crash dumps
Registry keys related to the tool or execution
These cause leaks 90% of the time
@reverseengine
پاک کردن واقعی تو ردزون یعنی چی
تو ردزون فقط این مهم نیست که چی میریزید رو هارد مهم ترش اینه که چی باید از بین بره که هیچ اثری ازش نمونه پاک کردن واقعی همون چیزیه که باعث میشه ریورس کاز حرفهای با فرق از آماتور شناخته بشه
چی باید حذف بشه
اهداف میانی ابزارهای مصرفی
اینها همون چیزایی ان که تو مسیر عملیات درست میشن:
فایلهای خروجی ابزارها
اسکریپتهای موقتی
DLL
های تزریقی
config
های تست
فایلهایی که فقط برای یک مرحله استفاده شدن
اینها اگه بمونن = هم لو رفتن عملیات هم باگ امنیتی
مشکل اصلی اینجاست: Windows پاک نمیکنه فقط unlink میکنه
وقتی یه فایل Delete میکنید فقط از جدول فایلها حذف میشه اما بیشتر حجم اطلاعات تو دیسک میمونه یعنی با Forensics راحت قابل ریکاوریه
پاک کردن واقعی یعنی:
پاک کردن Metadata
پاک کردن محتوا Overwriting
پاک کردن اثرهای Cached
پاک کردن Prefetch + EventLogs بعضی سناریو ها
روشهای پاک سازی
Overwrite امن
یعنی داده قدیمی با صفر/رندوم باز نویسی بشه تا برنگرده
خیلیا فکر میکنن 7-pass یا 35-pass لازمه نه!
روی SSD یک پاس رندوم هم معمولا کافیه
حذف log های بی اثر غیرسیستمی
مثلا لاگهای لوکال ابزارهایی که خودتون اجرا کردید نه سیستم
اینکار برای پاک کردن کار های خودتون طبیعی و امنه
Memory Cleanup
خیلیا حواسشون نیست ولی artifact های زیر توی RAM میمونن:
کلیدهای crypto مصرفی
بایت کد ابزار
Buffer
های network
دادههای حساس
پاک کردن حافظه یعنی:
بستن پروسه ها
پاک کردن Handle ها
Zero
کردن buffer های حساس
چیا معمولا جا میمونه؟
و باعث لو رفتن ابزار میشه
Artifact
های PowerShell History
Temp folderها
فایلهای Extract شده از Zip
Jump Listها Recent Items
Prefetch
Crash dumpها
registry keys مرتبط با ابزار یا اجرا
اینها 90٪ مواقع باعث لو رفتن میشن
True Deletion
What does true deletion mean in Redzone
In Redzone, it's not just about what you put on the hard drive, it's more important that what needs to be removed so that no trace of it remains. True deletion is what makes a professional reverse engineer different from an amateur.
What needs to be deleted
Intermediate goals of consumer tools
These are the things that are created along the way:
Tool output files
Temporary noscripts
Injected DLLs
Test configs
Files that are only used for one step
If these remain = both the operation and the security bug
The main problem here is: Windows does not delete, it only unlinks
When you delete a file, it is only deleted from the file table, but most of the information remains on the disk, which means it can be easily recovered with Forensics
True deletion means:
Erasing Metadata
Erasing content Overwriting
Clearing Cached traces
Clearing Prefetch + EventLogs Some scenarios
Clearing methods
Safe overwrite
That means overwriting old data with zero/random so that it doesn't come back
Many people think that 7-pass or 35-pass is not necessary!
On SSD, a random pass is usually enough
Delete ineffective non-system logs
For example, local logs of tools that you run yourself, not the system
This is normal and safe for clearing your own work
Memory Cleanup
Many people don't pay attention, but the following artifacts remain in RAM:
Used crypto keys
Tool bytecode
Network buffers
Sensitive data
Clearing memory means:
Closing processes
Clearing handles
Zeroing sensitive buffers
What usually remains?
And it causes tool leaks
Artifacts
PowerShell History
Temp folders
Files extracted from Zip
Jump Lists
Recent Items
Prefetch
Crash dumps
Registry keys related to the tool or execution
These cause leaks 90% of the time
@reverseengine
❤4👍1
Richkware a framework for building Windows malware, written in C++
https://forum.reverse4you.org/t/richkware-a-framework-for-building-windows-malware-written-in-c/17103
@reverseengine
https://forum.reverse4you.org/t/richkware-a-framework-for-building-windows-malware-written-in-c/17103
@reverseengine
R0 CREW
Richkware a framework for building Windows malware, written in C++
Denoscription Richkware is a library of network and OS functions, that you can use to create malware. The composition of these functions permits the application to assume behaviors referable to the following types of malware: Virus Worms Bot Spyware Keylogger…
❤4👍1
IDA Pattern Search is a plugin that adds a capability of finding functions according to bit-patterns into the well-known IDA Pro
https://forum.reverse4you.org/t/idapatternsearch-adds-a-capability-of-finding-functions-according-to-bit-patterns/17209
@reverseengine
https://forum.reverse4you.org/t/idapatternsearch-adds-a-capability-of-finding-functions-according-to-bit-patterns/17209
@reverseengine
R0 CREW
IDAPatternSearch adds a capability of finding functions according to bit-patterns
IDA Pattern Search is a plugin that adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidra’s function patterns format. Using this plugin, it is possible to define new patterns according to…
❤4👍1
Tickling VMProtect with LLVM
https://forum.reverse4you.org/t/tickling-vmprotect-with-llvm/16980
@reverseengine
https://forum.reverse4you.org/t/tickling-vmprotect-with-llvm/16980
@reverseengine
R0 CREW
Tickling VMProtect with LLVM
This series of posts delves into a collection of experiments I (fvrmatteo) did in the past while playing around with LLVM and VMProtect. I recently decided to dust off the code, organize it a bit better and attempt to share some knowledge in such a way that…
❤4👍1
Nim implementation of Process Hollowing using syscalls
https://github.com/snovvcrash/NimHollow
@reverseengine
https://github.com/snovvcrash/NimHollow
@reverseengine
❤1
iOS Tweak Development
Part1 https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2 https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3 https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4 https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
@reverseengine
Part1 https://cwcaude.github.io/project/tutorial/2020/07/02/iOS-tweak-dev-1.html
Part2 https://cwcaude.github.io/project/tutorial/2020/07/04/iOS-tweak-dev-2.html
Part3 https://cwcaude.github.io/project/tutorial/2020/07/12/iOS-tweak-dev-3.html
Part4 https://cwcaude.github.io/project/tutorial/2020/07/16/iOS-tweak-dev-4.html
@reverseengine
❤1
Powerful automated tool for reverse engineering Unity IL2CPP binaries
https://github.com/djkaty/Il2CppInspector
@reverseengine
https://github.com/djkaty/Il2CppInspector
@reverseengine
GitHub
GitHub - djkaty/Il2CppInspector: Powerful automated tool for reverse engineering Unity IL2CPP binaries
Powerful automated tool for reverse engineering Unity IL2CPP binaries - djkaty/Il2CppInspector
❤5
بخش یازدهم بافر اورفلو
تست کنترل کامل RIP/EIP
میخوایم به برنامه بگیم که میتونیم RIP/EIP رو کنترل کنیم
یعنی کاری کنیم که مقدار ریجستر بشه 0x42424242 یا 4222222 هگز معادل BBBB
اگه این مرحله موفق بشه یعنی:
ما وارد مغز برنامه شدیم
از اینجا به بعد میتونیم مسیر اجرای برنامه رو خودمون تعیین کنیم
ساختن ورودی تست کنترل
الان باید یه ورودی بسازیم که:
112 کاراکتر اول هرچی مثلا “A”
جای RIP 4 تا کاراکتر “B”
چون “B” در ASCII میشه 0x42 پس RIP باید بشه 0x42424242
برای مثال پایتونی ساده:
from pwn import *
offset = 112
payload = b"A" * offset
payload += b"B" * 8
برای 64bit معمولا 8 بایت برای 32bit چهار بایت
print(payload)
اجرای برنامه با پیلود کنترل
برنامه رو اجرا میکنیم:
./vuln $(python3 exploit.py)
یا اگر ورودی از stdin میخواد:
python3 exploit.py | ./vuln
چک کردن اینکه RIP کنترل شده
داخل gdb:
(gdb) run < <(python3 exploit.py)
(gdb) info registers
اگر همه چی درست باشه باید ببینید:
RIP: 0x4242424242424242
یا تو نسخه 32bit:
EIP: 0x42424242
Part 11 Buffer Overflow
Full RIP/EIP Control Test
We want to tell the program that we can control RIP/EIP
That is, we make the register value 0x42424242 or 4222222 hex equivalent to BBBB
If this step is successful, it means:
We have entered the brain of the program
From here on, we can determine the path of the program execution ourselves
Creating a control test input
Now we need to create an input that:
The first 112 characters of anything, for example “A”
Instead of RIP, 4 characters “B”
Since “B” is 0x42 in ASCII, then RIP should be 0x42424242
For a simple Python example:
from pwn import *
offset = 112
payload = b"A" * offset
payload += b"B" * 8
For 64bit, usually 8 bytes, for 32bit, four Byte
print(payload)
Running the program with the control payload
We run the program:
./vuln $(python3 exploit.py)
Or if it asks for input from stdin:
python3 exploit.py | ./vuln
Checking that RIP is controlled
Inside gdb:
(gdb) run < <(python3 exploit.py)
(gdb) info registers
If everything is correct you should see:
RIP: 0x4242424242424242
Or in 32bit version:
EIP: 0x42424242
@reverseengine
❤5
Malware analysis of Sepsis ransomware:
Analysis of malware attacked bank X customers:
Unpacking UPX manually:
Analysis of simple obfuscated office malware:
@reverseengine
https://www.reddit.com/r/MalwareAnalysis/comments/bgf71t/malware_analysis_of_sepsis_ransomware/
Analysis of malware attacked bank X customers:
https://www.reddit.com/r/MalwareAnalysis/comments/bgqz7m/analysis_of_malware_attacked_bank_x_customers/
Unpacking UPX manually:
https://www.reddit.com/user/Thatskriptkid/comments/c3csyd/unpacking_upx_manually/
Analysis of simple obfuscated office malware:
https://www.reddit.com/r/MalwareAnalysis/comments/bxvw1j/analysis_of_simple_obfuscated_office_malware/
@reverseengine
Reddit
From the MalwareAnalysis community on Reddit: Malware analysis of Sepsis ransomware
Explore this post and more from the MalwareAnalysis community
❤5
Introducing Lumen Server Protocol
A private Lumina server for IDA Pro
Investigating IDA Lumina Feature
Local server for IDA Lumina feature
@reverseengine
https://abda.nl/posts/introducing-lumen/
A private Lumina server for IDA Pro
https://github.com/naim94a/lumen
Investigating IDA Lumina Feature
https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html
Local server for IDA Lumina feature
https://github.com/synacktiv/lumina_server
@reverseengine
abda.nl
Introducing Lumen
Lumen - A private Lumina server for IDA Pro
❤5
Forwarded from GO-TO CVE
CVE-2025-32433-week-79.pdf
219.4 KB
🎯 Week 79 — CVE‑2025‑32433 — Erlang/OTP SSH — Pre‑Auth RCE
🔹 CVE: CVE‑2025‑32433
🔹 Type: Remote Code Execution (pre‑authentication flaw in Erlang/OTP SSH server)
🔹 Impact: Full system compromise via crafted SSH messages — no credentials required
🔹 Fixed in: OTP‑27.3.3 / OTP‑26.2.5.11 / OTP‑25.3.2.20
🔹 Action: Patch immediately or disable SSH / restrict access by firewall
Exploit
#week_79
🔹 CVE: CVE‑2025‑32433
🔹 Type: Remote Code Execution (pre‑authentication flaw in Erlang/OTP SSH server)
🔹 Impact: Full system compromise via crafted SSH messages — no credentials required
🔹 Fixed in: OTP‑27.3.3 / OTP‑26.2.5.11 / OTP‑25.3.2.20
🔹 Action: Patch immediately or disable SSH / restrict access by firewall
Exploit
#week_79
❤5
This media is not supported in your browser
VIEW IN TELEGRAM
Injection DLLs into the explorer process using icons
https://github.com/d419h/IconJector
@reverseengine
https://github.com/d419h/IconJector
@reverseengine
❤5
Forwarded from DarkBit
New Persistence Method In Windows.pdf
1.8 MB
🔒 تکنیک جدید Persist در ویندوز!
📌 خلاصه مقاله:
در این بخش به معرفی یک تکنیک پایداری (Persistence) در ویندوز میپردازیم که با استفاده از تزریق و جایگزینی DLL با دسترسی کاربر پیادهسازی شده است. در این روش، فایل DLL مخرب توسط فرآیند svchost.exe اجرا میشود و امکان اجرای مداوم و مخفیانه کد در سیستم هدف را فراهم میسازد.
#RedTeam #CyberSecurity
#Maldev #Persistence
#WindowsInternals
💬 Forum
📣 DarkBit
📌 خلاصه مقاله:
در این بخش به معرفی یک تکنیک پایداری (Persistence) در ویندوز میپردازیم که با استفاده از تزریق و جایگزینی DLL با دسترسی کاربر پیادهسازی شده است. در این روش، فایل DLL مخرب توسط فرآیند svchost.exe اجرا میشود و امکان اجرای مداوم و مخفیانه کد در سیستم هدف را فراهم میسازد.
#RedTeam #CyberSecurity
#Maldev #Persistence
#WindowsInternals
💬 Forum
📣 DarkBit
❤7👍1
DarkBit
New Persistence Method In Windows.pdf
🔒 New Persist Technique in Windows!
📌 Article Summary:
In this section, we will introduce a persistence technique in Windows that is implemented using DLL injection and replacement with user access. In this method, the malicious DLL file is executed by the svchost.exe process, allowing continuous and secret code execution on the target system.
#RedTeam #CyberSecurity
#Maldev #Persistence
#WindowsInternals
💬 Forum
📣 DarkBit
📌 Article Summary:
In this section, we will introduce a persistence technique in Windows that is implemented using DLL injection and replacement with user access. In this method, the malicious DLL file is executed by the svchost.exe process, allowing continuous and secret code execution on the target system.
#RedTeam #CyberSecurity
#Maldev #Persistence
#WindowsInternals
💬 Forum
📣 DarkBit
Telegram
DarkBit Community | انجمن دارکبیت
Channel: @DarkBitx
❤6
Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows
https://connormcgarr.github.io/km-shadow-stacks
@reverseengine
https://connormcgarr.github.io/km-shadow-stacks
@reverseengine
Connor McGarr’s Blog
Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows
Using SourcePoint’s JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
❤5
Analysing a 1-day Vulnerability in the Linux Kernel's TLS Subsystem
https://faith2dxy.xyz/2025-10-02/kCTF-TLS-nday-analysis
@reverseengine
https://faith2dxy.xyz/2025-10-02/kCTF-TLS-nday-analysis
@reverseengine
faith2dxy.xyz
Analysing a 1-day Vulnerability in the Linux Kernel's TLS Subsystem
I recently decided to start doing some Linux kernel security research in my free time, with the goal of creating one of my own submissions in Google's kernelCTF…
❤1