Decompiling the New C# 14 field Keyword
https://blog.ivankahl.com/decompiling-the-new-csharp-14-field-keyword/
#HackerNews #Decompiling #C# #CSharp14 #FieldKeyword #Programming #HackerNews
Decompiling the New C# 14 field Keyword
https://blog.ivankahl.com/decompiling-the-new-csharp-14-field-keyword/
#HackerNews #Decompiling #C# #CSharp14 #FieldKeyword #Programming #HackerNews
Some time ago, I played around with decompiling Java class files in a more efficient manner than traditional solutions like Vineflower allow. Eventually, I wrote an article on my approach to decompiling control flow, which was a great performance boost for my prototype. At the time, I believed that this method can be straightforwardly extended to handling exceptional control flow, i.e. decompiling try…catch blocks. In retrospect, I should’ve known it wouldn’t be so easy. It turns out that there are many edge cases, ranging from strange javac behavior to consequences of the JVM design and the class file format, that significantly complicate this. In this post, I’ll cover these details, why simple solutions don’t work, and what approach I’ve eventually settled on.
Decompiling the GPL violated Linux kernel using Evolutionary Algorithms
https://far.chickenkiller.com/computing/decompiling-the-kernel-using-ea/
#HackerNews #Decompiling #GPL #Linux #Kernel #Evolutionary #Algorithms #Computing #OpenSource
TLDR: We want to decompile a binary code, into the byte equivalent C code. We look at this from an optimization viewpoint. We have a generated C code(or AST) and we want to optimize it so when we compile it, it is equivalent to the binary code, byte by byte. And I think it’s better to use a population based optimization metaheuristic to do this. Such as Genetic Programming. Requirements to understand this post The idea I’m writing about is very deep. You need to know the current problem we have about companies violating GPL and not releasing the Linux kernel source code used in their devices. Then you need to know what an Algorithm is. What a Heuristic is. And what is the difference between them. And you also need to know what an optimization problem is. And what is our goal in these problems. After that, you need to know in this very specific optimization problem, we are not looking for “good enough” solutions unlike most other optimization problems. We are rather looking for the “perfect” solution, if we can find one.
does anyone know how i might go about exporting const data (like some array/structures) from a binary using DWARF info?
Ghidra can see the data and decode the types perfectly, but doesn't have a mechanism for exporting it as C code.
I started playing with pyelftools but it seems like I'd need to write a whole lot of code for this, so im hoping someone else has already solved it...
No human made system can stand the test of time, no matter how many times you may patch it - word to US legislature.
Regarding #hardware, it's time to demand #openfirmware from #manufacturers. It might mean giving extra playing cards to #hackers, but they can already read #assembly and have no problem #decompiling or #debugging their way to #vulnerabilities.
It's a good idea to start with all #x86 chips that are #EOL, which should be refurbished with open firmware.
I've written up how I extracted some firmware from the RF controller and where I am currently at. It's interesting and I feel as though I am pushing my own limits. Learning and discovery is always rewarding 😃
Wanna get #pwned by #decompiling a malicious Android app?
👉 Use JEB < 4.19.1 😉
Fascinating write-up on how they found out why JEB runs code from inside the app as su on the host!
https://blog.stmcyber.com/how-to-get-a-heart-attack-while-using-jeb-decompiler/