<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>HiperDrop 0.0.1</title>
                            <pubDate>Mon, 19 Jul 2010 17:01:22 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/1566/HiperDrop_0.0.1</link>
                                        <author>GynvaelColdwind &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Hi :)&lt;br /&gt;
&lt;br /&gt;
I've published a tool that I've made a while ago, and forgot&amp;nbsp;&amp;nbsp;it later. I've came across it yesterday while looking through the directories.&lt;br /&gt;
&lt;br /&gt;
Anyway, it's called HiperDrop, and it's a simple command line process memory dumper for Windows.&lt;br /&gt;
&lt;br /&gt;
Basically, it attaches to a process, read the whole memory (unlike LordPE / OllyDump, this tool is design to download the whole memory of the process), and saves it to disk.&lt;br /&gt;
&lt;br /&gt;
I've written some more details &lt;a href=&quot;http://gynvael.coldwind.pl/?id=327&quot;&gt;on my tech blog&lt;/a&gt; :)&lt;br /&gt;
&lt;br /&gt;
You can download the tool (it's open source) here:&lt;br /&gt;
&lt;a href=&quot;http://gynvael.coldwind.pl/download.php?f=HiperDrop-0.0.1.zip&quot;&gt;http://gynvael.coldwind.pl/download.php?f=HiperDrop-0.0.1.zip&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Take care :)&lt;br /&gt;
</description>
                    </item>
                <item>
            <title>The tale of Syndicate Wars Port</title>
                            <pubDate>Tue, 26 Jan 2010 19:26:05 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1544/The_tale_of_Syndicate_Wars_Port</link>
                                        <author>GynvaelColdwind &lt;email-suppressed@example.com&gt;</author>
                                                    <description>&lt;a href=&quot;http://www.openrce.org/blog/view/1543/Syndicate_Wars_-_a_reverse-engineering_tale&quot;&gt;As promised&lt;/a&gt;, It's time to reveal the technical story behind the &lt;a href=&quot;http://swars.vexillium.org/&quot;&gt;Syndicate Wars Port&lt;/a&gt;. The story is divided into two parts - the first, and the second attempt to port this game. Comments are welcomed!&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://gynvael.coldwind.pl/?id=279&quot;&gt;Read more...&lt;/a&gt; (be warned that the story is long :)&lt;br /&gt;
&lt;br /&gt;
&lt;img src=&quot;http://gynvael.coldwind.pl/img/swars_chanoine.png&quot; border=0 align=&quot;&quot;&gt;</description>
                    </item>
                <item>
            <title>Syndicate Wars - a reverse-engineering tale</title>
                            <pubDate>Mon, 25 Jan 2010 17:20:35 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1543/Syndicate_Wars_-_a_reverse-engineering_tale</link>
                                        <author>GynvaelColdwind &lt;email-suppressed@example.com&gt;</author>
                                                    <description>Syndicate Wars is a game published in 1996, created by &lt;a href=&quot;http://en.wikipedia.org/wiki/Bullfrog_Productions&quot;&gt;Bullfrog&lt;/a&gt;. The game was written in C (Watcom) for the &lt;a href=&quot;http://en.wikipedia.org/wiki/DOS4GW&quot;&gt;DOS4GW&lt;/a&gt; &lt;a href=&quot;http://en.wikipedia.org/wiki/DOS_extender&quot;&gt;DOS extender&lt;/a&gt;. And of course it has stopped working natively (i.e. without emulators like DOSBox) when the modern operating systems, like GNU/Linux or Windows NT series, emerged.&lt;br /&gt;
&lt;br /&gt;
A few years ago my friend, &lt;a href=&quot;http://unavowed.vexillium.org/&quot;&gt;Unavowed&lt;/a&gt;, told me about proposition of a project to create a port of Sydicate Word for modern OS'es like the two previous one I've mentioned. The port was to be done by decompiling the original executable file, locating all the functions from the standard C library, locating the DOS4GW and I/O (sound, keyboard, gfx, mouse, etc) dependencies, replacing them with modern native libc function call and libSDL/OpenAL libraries (sometimes using simple wrappers, other times by creating converters), and finally, recompiling it all to form native executables for the modern systems.&lt;br /&gt;
&lt;br /&gt;
Yesterday, &lt;b&gt;we've finished this project&lt;/b&gt;, and we've published executables, not only for GNU/Linux and Windows, but also for Mac OSX :)&lt;br /&gt;
&lt;br /&gt;
Project site (screens, downloads, even a video):&lt;br /&gt;
&lt;a href=&quot;http://swars.vexillium.org/&quot;&gt;http://swars.vexillium.org/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
As for the technical side of the project, I'll describe everything in the next post - it was the biggest reverse-engineering project I've took part in, and I hope you'll too find something interesting in the details for yourselves :)&lt;br /&gt;
&lt;br /&gt;
GNU/Linux:&lt;br /&gt;
&lt;img src=&quot;http://swars.vexillium.org/shots/swars-gnu-1.png&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Mac OSX 10.5:&lt;br /&gt;
&lt;img src=&quot;http://swars.vexillium.org/shots/swars-macos-1.png&quot; border=0 align=&quot;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
Windows Vista:&lt;br /&gt;
&lt;img src=&quot;http://swars.vexillium.org/shots/swars-windows-1.png&quot; border=0 align=&quot;&quot;&gt;</description>
                    </item>
                <item>
            <title>Exception detection on Windows and HITB ezine</title>
                            <pubDate>Mon, 11 Jan 2010 16:22:07 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1537/Exception_detection_on_Windows_and_HITB_ezine</link>
                                        <author>GynvaelColdwind &lt;email-suppressed@example.com&gt;</author>
                                                    <description>The &lt;a href=&quot;http://www.hackinthebox.org/&quot;&gt;Hack In The Box&lt;/a&gt; ezine, which was &lt;a href=&quot;http://www.hackinthebox.org/archive.php&quot;&gt;published&lt;/a&gt; in the years 2000-2005 (37 issues total) has been &lt;b&gt;revived&lt;/b&gt;!&lt;br /&gt;
The newest issue contains 6 articles (including mine), which gives 44 pages of text, in PDF (link below). Imho it's worth taking a look. It's very possible your find something interesting for yourself there :)&lt;br /&gt;
&lt;br /&gt;
Article list:&lt;br /&gt;
- p. 03 - Exception Detection on Windows (by me)&lt;br /&gt;
- p. 07 - The Art of DLL Injection (by Christian Wojner, CERT.at)&lt;br /&gt;
- p. 09 - LDAP Injection. Attack and Defense Techniques (cover story, by Esteban Guillardoy, Facundo de Guzman, Hernan Abbamonte)&lt;br /&gt;
- p. 18 - Xprobe2-NG. Low Volume Remote Network Information Gathering Tool (by Fedor V. Yarochkin. Ofir Arkin (Insightix), Meder Kydyraliev (Google), Shih-Yao Dai, Yennun Huang (Vee Telecom) and Sy-Yen Kyo)&lt;br /&gt;
- p. 25 - Malware Obfuscation. Tricks and Traps (by Wayne Huang, Armorize Technologies)&lt;br /&gt;
- p. 39 - Reconstructing Dalvik Applications Using UNDX (by Marc Sch&ouml;nefeld)&lt;br /&gt;
&lt;br /&gt;
Download: &lt;a href=&quot;https://www.hackinthebox.org/misc/HITB-Ezine-Issue-001.pdf&quot;&gt;HITB-Ezine-Issue-001.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Comments about my article are mostly welcomed :) </description>
                    </item>
                <item>
            <title>DR6 may or may not be useful for bochs/VirtualPC detection</title>
                            <pubDate>Tue, 05 Jan 2010 13:33:31 -0600</pubDate>
                                        <link>https://www.openrce.org/blog/view/1534/DR6_may_or_may_not_be_useful_for_bochs/VirtualPC_detection</link>
                                        <author>GynvaelColdwind &lt;email-suppressed@example.com&gt;</author>
                                                    <description>This post will be similar to the &lt;a href=&quot;http://gynvael.coldwind.pl/?id=268&quot;&gt;previous one&lt;/a&gt;, and will be about small, but interesting, details of x86 architecture, that might be (and sometimes are) easily overlooked by creators of emulators and virtual machines. The hero of today's post is the DR6 debug register, or, to be more precise, the four least significant bits of this register - B0 to B3 (breakpoint condition detected flags). &lt;b&gt;Please read the whole post before jumping into any conclusions :)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://gynvael.coldwind.pl/?id=269&quot;&gt;Read the full post...&lt;/a&gt;</description>
                    </item>
            </channel>
</rss>
