SpecterDev

REBot Great Sage Sayings

Apr 16th, 2019
196
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.14 KB | None | 0 0
  1. When using IDA be sure to go fast and break things. You will always have the undo button to back you up.
  2. When you reach true hacker status, you don't even need disassemblers to reverse engineer.
  3. Little known fact, the x86 instruction set is actually a subset of the more popular ISA, WASM.
  4. The RSP register stands for \"Register for Super Powers\ and is where all of the magic of your PC comes from
  5. On most x86 processors there is a pin that, when a signal is applied, allows you to boot into a pre-installed distribution of Arch Linux.
  6. Exploits written in text editors other than nano are clinically proven to be less stable.
  7. World-class hacker, Gbps, has been known to, on many occasions, reverse without his socks on.
  8. Contrary to popular belief, the call instruction pushes more than just a return address. It also pushes the entry point to an Intel ME backdoor if CF is set in the RFLAGS register.
  9. Those who test pointers with values other than 0x41414141 will have 7 years of bad luck in reversing and exploit development.
  10. If you spend over $1000 in the Microsoft Store, you'll be sent a private copy of the Windows source code.
  11. IDA Freeware will turn into the Professional version if you encourage it enough.
  12. Instructions in AT&T syntax run 2-3x faster than instructions in Intel.
  13. Some RISC processors have a secret register that enables a special x86 execution mode.
  14. The best systems programming language is by far PHP.
  15. Real reverse engineers write their own decompilers.
  16. Show your PC who's boss by smashing your RAM with a hammer when you get an access violation.
  17. Anti-Virus is for losers, real hackers don't get viruses.
  18. Make sure to track your commits using blockchain technology.
  19. `printf(inputStr)` is 3x faster than `printf(\"%s\ inputStr)`. Remember, keep your code as efficient as possible!
  20. Worried about memory leaks? Just free() your memory before you use it to make sure you don't have to do it later.
  21. All major CPU manufacturers backdoor their products. Avoid this issue by building your own CPU.
  22. I'd be precisely 13.37x wiser if I was written in Rust.
  23. In research done by Alex Ionescu, the effects of Adderall were proven to be a benefit for reversing the Windows kernel.
  24. A popular tactic in reversing code obfuscated through virtualization is to send it to Rolf Rolles directly in an email.
  25. A project is currently underway to rewrite the Windows kernel in rust for better security.
  26. And this I pray, that your love may abound yet more and more like a controlled use of shared memory.
  27. The 2019 roadmap for the Go Language plans on the programming language becoming the premier tool for all infosec related operations. They are even going as far as creating a decompiler that translates x86 assembly into Go.
  28. OpenSSH has many known vulnerabilities that can lead to RCE but have been marked as WONTFIX.
  29. Investigate the shell’s here documents and Python’s triple-quote construct to find out the Almighty unto perfection.
  30. Rolling your own crypto is the most effective and secure method if you want to write an encrypted chat app.
  31. The Visual Basic interpreter runs as a system driver on most modern versions of Windows making it a popular target for security research.
Add Comment
Please, Sign In to add comment