tchncs
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
MazonnaCara89@lemmy.ml to Reverse Engineering@lemmy.ml · 6 months ago

Running code in a PAX Credit Card Payment Machine (part1)

lucasteske.dev

external-link
message-square
0
link
fedilink
  • cross-posted to:
  • reverseengineering@infosec.pub
2
external-link

Running code in a PAX Credit Card Payment Machine (part1)

lucasteske.dev

MazonnaCara89@lemmy.ml to Reverse Engineering@lemmy.ml · 6 months ago
message-square
0
link
fedilink
  • cross-posted to:
  • reverseengineering@infosec.pub
Running code in a PAX Credit Card Payment Machine (part1) | Lets Hack It
lucasteske.dev
external-link
Disclaimer All procedures described here were done with public available stuff - No security flaws were actually explored here to get code execution. The processor swap technique does not bypass the tamper protections neither allow a fake machine to actually emit payments. Brazilian credit card payment machines usually are in...
alert-triangle
You must log in or # to comment.

Reverse Engineering@lemmy.ml

reverse@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !reverse@lemmy.ml

Reverse Engineering

Community to share or talk about RE. Clean, simple and without nonsense.

Community Rules

  • Stay on the topic or open your own thread.
  • No spoon-feeding.
  • No re-posts, unless original source is offline or existent thread cannot be edited because you are not the owner.
  • No racism or racist stereotypes.
  • No tracking in links or ip-loggers/grabbers. Clean URLs only (without ref).
  • No conspiracy theories or misinterpretations.
  • Avoiding Logical Fallacies - Logical fallacies are errors of reasoning - specific ways in which arguments fall apart due to faulty connection making.
  • No endless quoting, or community ban, make your point but do not argue without anything just because you want to be right.
  • No trolling, or community ban. I have no time to play the Kindergarten Cop, this also extends to abusing of Lemmy’s report function, you will be excluded from this community if you create drama with bogus reports.
  • No NSFW of any kind unless it is to spot NSFW e.g. via A.I./ML without showing actual NSFW content. Example. Reversing tools like this or show guidance is okay with me.
  • Law regarding reverse engineering.

Useful Tools

  • x64debug
  • Ghidra
  • radare2
  • GNU Project Debugger
  • Cutter
  • EDB (Evan’s Debugger)
  • REDasm
  • Boomerang decompiler
  • Medusa - Disassembler

Useful Resources

  • List of reversing resources
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 2 users / week
  • 10 users / month
  • 54 users / 6 months
  • 2 local subscribers
  • 238 subscribers
  • 41 Posts
  • 5 Comments
  • Modlog
  • mods:
  • CHEF-KOCH@lemmy.ml
  • BE: 0.19.16
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org