7 posts in tag Analysis API
Detecting Buffer-Overflow vulnerabilities using REVEN
11 Feb 2021
by
Quentin
-
REVEN
-
Reverse Engineering
Vulnerability Detection
Analysis API
Taint
REVEN

The REVEN Buffer-Overflow (BoF) detection capability is built on the top of the Use-after-Free (UaF) script. Therefore, it is best to read the UaF article before this one. We will explain how the UaF detection Jupyter notebook led us to develop a Buffer-Overflow detection Jupyter notebook (available on Github) and...
Finding uses of cryptographic functions and the data encrypted by an application

How to find cryptography implemented by an application in a REVEN trace? Let’s explore two ways of doing so! Looking for known symbol calls REVEN provides several features related to symbol calls: The symbol search feature allows you to look throughout the entire trace to find calls to a specific...
Detecting Use-After-Free vulnerabilities using REVEN
15 Dec 2020
by
Louis
,Quentin
and Benoit
-
REVEN
-
Reverse Engineering
Vulnerability Detection
Analysis API
Taint
REVEN

Tetrane’s Timeless Debugging and Analysis (TDnA) allows to capture a time slice of the execution of a system (CPU, Memory, Hardware Events) and provides some powerful analysis features that speed up and scale the reverse engineering process. It can be combined with various fuzzing approaches that will drive the discovery...
Interactive write-ups with REVEN and Jupyter

OK, so you just recorded this nice trace of the latest malware-of-the-week, great! You went around the timeline in Axion, did some symbol search, it all looks very promising. Time to dive into the depths of the analysis… What was the name of that function again? The one that’s probably...
Tracing network data back to encryption

In this video, we demonstrate how REVEN makes it possible to connect data sent through the network with the code that generated it beforehand. In our case, this reveals a decryption routine in a malware. The first step is to reconstruct a usable PCAP file from the trace to explore...
Automated analysis of crashes or malware, and integration with fuzzers
06 May 2020
by
Mathieu
-
Tutorial
Automation
-
Demo
Automation
Workflow API
Analysis API
Scenario recording

Analyzing a crash within a fuzzing process or not, capturing and analyzing malware activities, those tasks can now be fully automated with REVEN. It’s also easy to plug it into your tool chain or customize it. This demo presents the entire automated workflow: starting a VM. loading and launching the...
REVEN 2.2: Python API, Automatic Recording, and more

Tetrane is happy to announce the recent release of REVEN 2.2. REVEN is an automated Reverse Engineering Platform designed to go x10 faster & x10 deeper using Timeless Analysis. Technically, REVEN captures a time slice of a full system execution (CPU, Memory, Hardware events) to provide unique analysis features that...