digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

836
active users

#reverseengineering

10 posts9 participants0 posts today
Replied in thread

@sven Yeah, the Sony camera community is rather dormant as well. There are also github.com/ma1co/fwtool.py and github.com/falk0069/sony-pm-al but I'm not aware of break-throughs in firmware modding / Linux rooting.

There was also a long thread on the orange site re one of my blog posts <news.ycombinator.com/item?id=4> but it didn't yield any insights for Sony alpha, only the Sony QX models - en.wikipedia.org/wiki/Sony_ILC

A tool to unpack Sony camera firmware images. Contribute to ma1co/fwtool.py development by creating an account on GitHub.
GitHubGitHub - ma1co/fwtool.py: A tool to unpack Sony camera firmware imagesA tool to unpack Sony camera firmware images. Contribute to ma1co/fwtool.py development by creating an account on GitHub.

If you are a power #vim user you are probably used to the m' navigation workflow, which is also implemented in Visual mode in radare2. Now you can experience not just the hjkl movement keys in iaito (the radare2 interface) but also the m' keys in hex, disasm, decompiler and graph views for quick moving around the binary! #reverseengineering #ui

“The invalid 68030 instruction that accidentally allowed the Mac Classic II to successfully boot up”

"This is the story of how Apple made a mistake in the ROM of the Macintosh Classic II that probably should have prevented it from booting, but instead, miraculously, its Motorola MC68030 CPU accidentally prevented a crash and saved the day by executing an undefined instruction.”

downtowndougbrown.com/2025/01/

www.downtowndougbrown.comDowntown Doug Brown » The invalid 68030 instruction that accidentally allowed the Mac Classic II to successfully boot up

Managed to put this device in bootloader usb upload/download mode.

But didn't find any sdk/tool that describe/implement the protocol.

From what I've overlooked in the bootloader, it's quite a simple one, so it will be easy to implement.

But man, it's just a waste of time.

Please, manufacturers, release the sdks...
#reverseengineering

A common way for malware to disguise its C2 communication and stay under the radar is mimicking widely accepted protocols such as TLS and blend into the existing traffic.

The deep dive below into PebbleDash’s FakeTLS C2 protocol shows how North Korean APTs fake TLS handshakes and use hardcoded RC4 encryption to blend in with legit HTTPS traffic. Sneaky stuff — and a must-read for threat hunters. 🔍💻

malwareandstuff.com/reversing-

Malware and Stuff · Reversing PebbleDash’s FakeTLS ProtocolSo I was looking through the CISA’s recent publications regarding three tools named PebbleDash[1], Copperhedge[2] and Taintedscribe[3] which are believed to be used by the state-sponsored Nor…

Got the BGA63 adapter I ordered for the XGecu T48 this morning. If there's ever been an adapter that needed to come with a pack-in user guide it's this one. It's a combined BGA48/BGA63 adapter and the "combined" part is that you have to transfer the whole thing from one bare circuit board to another when you want to switch.

... so after having had to crawl around on the floor looking for those 48 tiny spring loaded pins that easily drops out when you don't have such a guide I finally managed to read out the NAND from a new IoT device I'm targeting atm.

Good: Not encrypted
Bad: As I had guessed, I don't think this is where the main CPU keeps its code

... but let's see where this can take us.

Hello! 👋 I don't want to #GetFediHired (yet?), but I am looking for contacts 👥 who can help me connect and offer a reality check on a potential new career path ⛰️🏁✅ by telling about their experiences.

I'm currently working as an embedded software engineer 💻, but I'm exploring a transition into IT/OT security — ideally working as a pentester or reverse engineer focusing on embedded devices, IoT, or SCADA systems 🔒🤖.

My thread... 🧵

#FediJobs #EmbeddedSecurity #ReverseEngineering :BoostOK:

Ah yes, nothing screams "cutting-edge tech genius" like spending 68 minutes reverse engineering a fan to escape the tyranny of its app. 🌬️🔧 Instead of enjoying clean air, let's devote our weekends to making sure our air purifier can join the unified utopia of Home Assistant—because who needs a social life when you can have a cloud-free smart home? 😂🏠
jmswrnr.com/blog/hacking-a-sma #cuttingedge #reverseengineering #smarthome #HomeAssistant #techhumor #HackerNews #ngated

James Warner · Hacking a Smart Home DeviceHow I reverse engineered an ESP32-based smart home device to gain remote control access and integrate it with Home Assistant.

Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. recon.cx #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @SinSinology @hunterbr72 @clearbluejar @phLaul @oryair1999 @hookgab @TheQueenofELF @So11Deo6loria @i0n1c @pedrib1337 @MalachiJonesPhD @Pat_Ventuzelo @KB_Intel @pinkflawd @Reverse_Tactics @OnlyTheDuck @t0nvi @drch40s @BrunoPujos @mhoste1 @andreyknvl @texplained_RE @jsmnsr @pulsoid @SpecterDev @richinseattle @yarden_shafir @aionescu @hackerschoice @SinSinology @sergeybratus @SpecterOps @oryair1999 @phLaul @trailofbits @HexRaysSA @nostarch