TippingPoint Digital Vaccine Laboratories
DID YOU KNOW... The ZDI has published over 1100 high-risk vulnerabilities since the inception of the program.

Pwn2Own 2012 and Google Pwnium

As you may have heard, Google has withdrawn sponsorship of this year's Pwn2Own contest. They have also announced their plans for a similar contest focused solely on their products. We'd like to clarify why this has occurred and reiterate the reasoning behind why the Pwn2Own contest is designed the way it is. Background on Pwn2Own For those unfamiliar with the history b ...


MindshaRE: Python Syntax Coloring in IDA

MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things small and discuss every day aspects of reversing. You can view previous entries by going through our blog history or querying a search engine for dvlabs mindshare. In a prior post I showed how if you compile a newer version of PySide you can get acce ...


MindshaRE: Yo Dawg, I heard you like reversing...

...so I reversed your reversing tool to help you reverse better. MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things small and discuss every day aspects of reversing. You can view previous entries by going through our blog history or querying a search engine for dvlabs mindshare. Update: Igor Skochinsky pointed out that hooking specific actions can be accomplished via the idautils.Proc ...


MindshaRE: Adding Cross References via IDAPython

MindshaRE is our periodic look at some simple reverse engineering tips and tricks. The goal is to keep things small and discuss every day aspects of reversing. You can view previous entries by going through our blog history or querying a search engine for dvlabs mindshare. If there's one thing I've noticed about working with as many reverse engineers as I have, it is that we all use our tools differently. Many of the best reversers I've met barely touch a debugger ...


MindshaRE: IDAception

If you've ever tried collaborating with other people while reverse engineering a vulnerability your process probably includes some tedious steps, like transferring: Your IDB Your notes/readme files Virtual machines Proof of concept files IDAPython scripts PCAPs ... After doin ...