The tag has no wiki summary.

learn more… | top users | synonyms

-4
votes
0answers
20 views

Blackberry Application Security; Get The Application Binary. [closed]

I'd like to perform security testing on a blackbbery application. Nowadays, the application world is only accessible with a blackberry service. At first, I'd like to install the application from ...
7
votes
3answers
207 views

Is it safer to compile open source code vs simply running the binary?

I understand that with OpenSource software, my milage may vary based on the trust of the author and the distribution platform they use (Codeplex, Git, or private server). Oftentimes a FOSS website ...
1
vote
1answer
106 views

How to run client's code on server securely

I'm working on a project basically a web application. It accepts code (java, c, c++) from client, compile and execute on server and return the results back to client. As I'm going to execute code on ...
3
votes
5answers
240 views

Does a binary executable have to have some critical plain-text components?

When companies package binary executables, they are often encrypted, compressed, scrambled, and otherwise made so that your lazy hacker can't simply open the program up in Notepad++ and see the code. ...
0
votes
3answers
178 views

Debugging and DLL-Injection

Hi I currently reading Gray Hat Python to learn about Debugging and various interesting techniques for binary analysis. So far I have learned an amazing amount of stuff (just read about ...
2
votes
2answers
187 views

Are GUID visible when compiling a .NET project?

I know if a person has a GUID from a machine that person can figure out if other guid belongs to that machine. In a .NET project (csproj and the visual studions solution file) GUIDs are generated. If ...
5
votes
3answers
411 views

Does the endianness used with an encryption algorithm affect its security?

I'm implementing the AES block cipher, which reads/writes data in 16 byte blocks. The implementation I'm working with usually read data in the little endian format. But in my platform the endianness ...
13
votes
4answers
10k views

How to inject executable, malicious code into PDF, JPEG, MP3, etc.?

I wanted to know if its generally possible to inject executable code into files like PDFs or JPEGs etc., or must there be some kind of security hole in the application? And if so, how would one do ...
10
votes
5answers
692 views

Code Analysis: Binary vs Source

While conducting a software security assessment, if you have access to the source code of a compiled application (say C++), would you ever do any analysis upon the compiled version, either with any ...
9
votes
5answers
1k views

Storing private asymmetric key in application binary?

I would like to give a daemon-style process (i.e. no user interaction) access to a shared secret key so that it can access a shared, encrypted data file. User applications accessing the same encrypted ...
13
votes
8answers
2k views

Any comprehensive solutions for binary code protection and anti-reverse-engineering?

Does anyone know of good products with comprehensive binary hardening and anti-reverse-engineering features? Or better, has anyone seen an independent review comparing products that perform these ...
13
votes
4answers
1k views

What is the corrupted image vulnerability? How does it work?

What exactly happens when someone injects malicious binary code into an image file (on Windows)? How is that done?