• Lunacy@lemmy.ml
    link
    fedilink
    arrow-up
    3
    arrow-down
    10
    ·
    3 years ago

    Good luck trying to do the same with Windows or MacOS.

    When it comes to find bug, vulnerabilities, audit etc. closed source is not so different from open source, people can actually reverse engineering closed source software, that’s why Windows 10, for instance, has malware. If I recall correctly, reverse engineering is used even for open source software because its more easy to understand how the code work.

    • ninchuka@lemmy.ml
      link
      fedilink
      arrow-up
      6
      arrow-down
      3
      ·
      edit-2
      3 years ago

      how the fuck is reverse engineered code easier to read then the source code?? that makes no sense what so ever

      • Lunacy@lemmy.ml
        link
        fedilink
        arrow-up
        3
        arrow-down
        3
        ·
        edit-2
        3 years ago

        Hi. Can you please be more nice in the future? I don’t see any reasons to be rude. Maybe I’m wrong, I’m open to discussion, but your point doesn’t prove anything in my opinion.

        In software design, reverse engineering enables the developer or programmer to add new features to the existing software with or without knowing the source code. Different techniques are used to incorporate new features into the existing software.

        Reverse engineering is also very beneficial in software testing, as most of the virus programmers don’t leave behind instructions on how they wrote the code, what they have set out to accomplish etc. Reverse engineering helps the testers to study the virus and other malware code. The field of software testing, while very extensive, is also interesting and requires vast experience to study and analyze virus code.

        The third category where reverse engineering is widely used is in software security. Reverse engineering techniques are used to make sure that the system does not have any major vulnerabilities and security flaws. The main purpose of reverse engineering is to make the system robust so as to protect it from spywares and hackers. Infact, this can be taken a step forward to Ethical hacking, whereby you try to hack your own system to identify vulnerabilities.

        https://blog.udemy.com/reverse-engineering-tutorial/

        Beyond that, there are different articles about this topic, including,

        Reverse engineering is a process that hackers use to figure out a program’s components and functionalities in order to find vulnerabilities in the program. You recover the original software design by analyzing the code or binary of the program, in order to hack it more effectively.

        https://medium.com/swlh/intro-to-reverse-engineering-45b38370384

        After a while, I decided a write a short blog post about Linux binary reversing CTFs in general.

        https://osandamalith.com/2019/02/11/linux-reverse-engineering-ctfs-for-beginners/

        During a past job interview, I was tasked to reverse four linux binaries of increasing difficulties as proof of my ability into the reverse engineering field.

        https://blog.kartone.ninja/2019/03/25/when-a-reverse-me-ctf-binary-makes-you-loose-that-job/