<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>reverse &#8211; SCRT Team Blog</title>
	<atom:link href="/tag/reverse/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Thu, 26 Mar 2026 08:40:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>reverse &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Insomni&#8217;hack 2022 &#8211; GDBug write-up</title>
		<link>/2022/03/29/gdbug-write-up/</link>
		
		<dc:creator><![CDATA[Frédéric Bourla]]></dc:creator>
		<pubDate>Tue, 29 Mar 2022 19:21:00 +0000</pubDate>
				<category><![CDATA[Insomni'hack]]></category>
		<category><![CDATA[reverse]]></category>
		<guid isPermaLink="false">/?p=3409</guid>

					<description><![CDATA[The GDBug file is an ELF binary: It simply requires a valid serial that we should identify: The strings do not reveal anything, besides a fake flag which is not accepted: Anyway, the binary doesn’t seem to have particular protections: There only seems to be a basic anti-debug: But old versions of GDB and Radare2 &#8230; <a href="/2022/03/29/gdbug-write-up/" class="more-link">Continue reading <span class="screen-reader-text">Insomni&#8217;hack 2022 &#8211; GDBug write-up</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Analyse d&#8217;un malware iOS : Unflod.dylib</title>
		<link>/2014/04/18/analyse-dun-malware-ios-unflod-dylib/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Fri, 18 Apr 2014 12:43:58 +0000</pubDate>
				<category><![CDATA[Forensics]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[dfir]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[jailbreak]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[reverse]]></category>
		<guid isPermaLink="false">/?p=1322</guid>

					<description><![CDATA[Suite à la parution de commentaires sur&#160;/r/jailbreak concernant un malware ciblant iOS, je me suis dis qu&#8217;une analyse serait intéressante vu que cette plateforme est encore peu ciblée par ce type de menaces du à son architecture. La première étape fut de récupérer des informations sur le binaire, ie. Entitlements et signature du code. Le &#8230; <a href="/2014/04/18/analyse-dun-malware-ios-unflod-dylib/" class="more-link">Continue reading <span class="screen-reader-text">Analyse d&#8217;un malware iOS : Unflod.dylib</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
