Wednesday, December 2, 2020

Visual C++ RTTI research

Visual C++ RTTI research

  1. Visual C++ RTTI Inspection
  2. Reversing Microsoft Visual C++ Part II: Classes, Methods and RTTI
  3. Reversing Microsoft Visual C++ Part I: Exception Handling
  4. /GR (Enable Run-Time Type Information)
  5. To set this compiler option in the Visual Studio development environment Open the project's Property Pages dialog box. For details, see Set C++ compiler and build properties in Visual Studio.

    1. Click the C/C++ folder.
    2. Click the Language property page.
    3. Modify the Enable Run-Time Type Info property.

  6. How expensive is RTTI?
  7. samsonpianofingers / RTTIDumper
  8. C++ Introspection
  9. university of Groningen

  10. Run-time Type Information: An Easy Solution
  11. The Moleview lens
  12. Visual Basic static analysis, clone detection, and automatic refactoring
  13. Visualization of Large C and C++ Code Bases
  14. Multiscale Data and Shape Analysis
  15. www.openrce.org

  16. Windows Memeory Layout
  17. PE format
  18. OpenRCE Anti Reverse Engineering Techniques Database
  19. quarkLab.com

  20. Epona: code, data and keys protection software
  21. Epona and the Obfuscation Paradox: Transparent for Users, a Pain for Reversers
  22. Unaligned accesses in C/C++: what, why and solutions to do it properly
  23. aguinet / intmem
  24. A glance at compiler internals: Keep my memset
  25. quarkslab / quarkspwdump
  26. quarkspwdump Dump various types of Windows credentials without injecting in any process.

  27. quarkslab / dreamboot
  28. quarkslab / blackbox
  29. Epona new release
  30. Epona Application Protection is based on the industrial-strength, widely adopted LLVM compiler infrastructure maintained and extensively tested by the world’s top technology organizations, resulting in seamless integration with the most common software development environments and toolchains.

    The full set of capabilities includes:

    • State-of-the-art obfuscation techniques agnostic of the application’s programming language and target platform, thus the same protection mechanisms can be used on all supported platforms and with software written in any of the supported languages. This guarantees a similar level of protection and robustness against manual and automated reverse engineering for software running on any of the supported platforms.
    • Integrity protection to prevent modification of the application code or tampering with the application’s sensitive data.
    • Runtime Application Self-Protection (RASP) capabilities to prevent and detect tampering of the application’s runtime environment such as jailbreaking, rooting, debugging, and dynamic instrumentation (hooking).
    • Static and dynamic whitebox cryptography implementations of standard ciphers.
    • Fine-grained controls that let customer organizations optimize the performance vs. security trade-off according to their needs and policies.

    «The release of Epona Application Protecion v1.5 is the result of an effort of many person-years developing an answer to our customer’s most challenging question: How do I protect my code and data on an unmanaged device, under the control of a potential attacker ? We believe we now have a robust, comprehensive and affordable response to address that question» said Iván Arce, CTO of Quarkslab.

    What’s new in Epona Application Protection v1.5

      A new Control Flow Graph obfuscation, in addition to CFG Flattening. Improved use of Opaque Predicates. Improved instruction-level obfuscation. Fine grained control of obfuscations to achieve binary runtime performance and size optimizations. Android NDK 18b and 19b support. Obfuscations that require threading support can now be used on ARM. The epona-report tools can now be used to check properties of the protected app’s final binary. A static and dynamic whitebox implementation using Epona compiler. An advanced whitebox implementation library.

  31. Inside C++ – Introduction
  32. Getting Started with the LLVM System using Microsoft Visual Studio¶
  33. Compiling C++ code at runtime
  34. Clang Rocks!
  35. Inside C++ – Class, Struct and Objects
  36. Articles by Martin Vorbrodt (Technical Blogs: 8, Tip/Tricks: 41)
  37. QuickDialogs - A Library for Creating Dialogs Quickly and Elegantly

1 comment:

  1. Analyzing everything, really like this message. Dependably it's difficult to pick the positive from for the check people, yet I think you nailed it! The best services and assistance were ensured. If you facing HP Printer Activation Error Code 30 click the link.

    ReplyDelete