Reverse-engineering

Synacktiv relies on a team of reversers able to test the security of software solutions - whether obfuscated or not - without having the corresponding source code

Our versatile experts can audit consumer as well as industrial programs and operating systems, regardless of their intended media: computer, phone, networking or industrial equipment, IoT, etc.

EXAMPLES OF ENGAGEMENTS

  • Blackbox analysis of a proprietary DRM solution
  • Reverse-engineering of a decoding video stream kernel module, as part of a security assessment
  • Exploitation of a use-after-free vulnerability allowing privilege escalation on the audited system
Reverse-engineering

Tools

IDA Pro, Ghidra, Binary Ninja, jeb, BinDiff, x64Dbg, Windbg, Frida,
QEMU, LLVM, AFL, libFuzzer