Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Who corrupted the data! Get a fast and precise answer with the taint
  • REVEN OpenLab - Feb 18th, 2021
  • Detecting Buffer-Overflow vulnerabilities using REVEN
Categories
  • Reven (18)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Conference (2)
  • All posts (50)
Tags
  • Axion (7)
  • Reven (43)
  • Reverse engineering (29)
  • Taint (9)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (1)
  • Ctf (2)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (9)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (7)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Use after free (2)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (2)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Who corrupted the data! Get a fast and precise answer with the taint

18 Feb 2021 by Louis - REVEN - REVEN Reverse Engineering Taint

In vulnerability analysis a frequent question that needs answering is: “who corrupted this data?”. Timeless Debugging and Analysis (TDnA) systems like REVEN can provide fast and accurate answers to this particular question. For example, the Memory History feature of REVEN allows to see the entire list of accesses to a...

©2019 Tetrane