![]() ![]() I wish that my oversight had not damaged your opinion of me but it appears that feelings have festered. You have my personal contact information and could have addressed this with me 1 on 1. OLIVE_APP_ID = '9319141212m2ik' # Required for the thermostatĪddressing the concern that I “ripped off all your code” I would suggest that you run the MOSS system on our codebases and see for yourself Detecting Plagiarism. ![]() OLIVE_SIGNING_SECRET = 'wyze_app_secret_key_132' # Required for the thermostat I apologize that you were not recognized for this contribution and will add your name to the readme. I ended up doing significant work on reverse engineering on my own the only thing that I used from your investigations was the signing secret and app id (I had a hard time deriving this). ![]() I have not stolen any of your intellectual property… whatever that means in the case of open source. I thought that we ended our discussions amicably however that must not be the case. The code for wyzeapy has been public for a long time. This entry was posted in Anti-Virus, End-user Focused, Malware, Tool Review and tagged mac, malware research, OS X, tools by Brent Huston. PSS – MSI has no affiliation or relationship with the product and/or the developers. PS – If you want to see what the GUI looks like, there are a wide variety of screenshots in the App Store at the link above. He responds quickly to questions and requests, plus provides great insights into where he is taking the product next. Lastly, I would like to thank the author of Hopper, Vincent Benony for his work on this tool and for his engagement with the infosec community on Twitter. Truly, it is a worthwhile investment if you want to learn more about assembler, the inner workings of code and beginning malware analysis. It’s an amazingly versatile and useful tool at an incredible price. Overall though, that’s about the ONLY complaint I have about Hopper. This a common issue among disassemblers and shows that we have a way to go to improve these products as the reverse engineering and malware study tool sets improve and mature over time. One of things I would like to see in future versions of the tool would be a detector for encoded binaries and support for some of the basic decoding tools to make analysis of obfuscated applications a bit quicker, easier and more intuitive. The flow control graphing, colorized interface and intuitive controls make the tool use less complex than Olly and IDA Pro. These add to the existing support for the standard Intel platforms of Mac OS X and Windows binaries, making this an all around useful tool for doing the basics. The newest release supports ARM, 32 & 64 bit ELF and iOS Mach-O. In terms of use, the tool does exactly what you expect from the description – it disassembles binaries into assembler and makes exploration of the deeper nuances of the code accessible. The app store link for the tool, in case you want to check it out, is here. If you hack stuff, reverse stuff or study malware on the Mac, the $60 price point is likely to make this a big winner for your budget. It is even mid-line in price, coming in between Olly, which is free, and IDA Pro which can run over a thousand dollars per license. It is more accessible on the mac than firing up a VM and using the venerable OllyDbg and the interface is quite a bit more elegant and user friendly. The tool is essentially a mid-line tool for working to reverse engineer code. I have recently been playing with Hopper, a disassembler for Mac OS X, quite a bit. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |