The Eye of the Binary #programming #lowcode #tech #codinglessons #security

preview_player
Показать описание

🔍 Dive into the world of visual binary analysis! Learn how to uncover hidden data and secrets within binary code. #BinaryAnalysis #DataEncryption #TechExplained #TechTips #CyberSecurityAwareness

🔥🔥🔥 SOCIALS 🔥🔥🔥
Рекомендации по теме
Комментарии
Автор

My favorite thing is to load it into audacity as a raw audio format. Not only can you hear text you can also find the audio files.

Bp
Автор

Very useful for getting a feel of the binary you're triaging. I use that as a good starting point for looking at suspected malware in a disassembler. One trick malware uses a lot is having payload code that is obfuscated by a simple xor cipher

ApertureAce
Автор

I made something similar but for mapping harddrive content. To distinguish between wiped, zeroed and not wiped. It was easy to spot the difference. Sometimes wiping software stop working due to maybe a bad sector or some other failure. To make sure the drive is wiped I just display the drive map.

imqqmi
Автор

Cypher in the matrix: “you see that hot blonde”

CallousCoder
Автор

Makes sense. At the assembly level there's a lot of boilerplate stuff that repeats like stack frame setup. There's some randomness but a lot of bytes for the common instructions repeat. In encrypted data there is far less repetition of byte patterns. In fact, most encryption cyphers are designed to obfuscate repeating plaintext data patterns to prevent leaking information into the cyphertext. Random initializations vectors for AES would be an example of that, to prevent common message headers from being guessed and leaking information about the substitution order.

craigsparton
Автор

I've always listened to data as u8 8khz audio, really good at finding what the type is. Also good is using an oscilloscope app to treat odd and even bytes as x and y

kreuner
Автор

And this lays the foundation of our works in the use of deep recurrent–convoluted stable diffusion-based information-geometric methods in security and formal verification.

hypatia-du-bois-marie
Автор

That's sick! What's that program?

thelaiq
Автор

5 colored binary data ladies and gents.

hanfo
Автор

This is a concept I’ve thought about and never knew it was a thing. Thanks!

cllout
Автор

Remember kids: entropy is just a measure of how unpredictable a random variable is.

Eta_Carinae__
Автор

Omg it totally looks like an experiment I did years ago to see how an 8-bit machine actually reads instructions and data on its memory. I made a couple videos about it, they're on my profile

risallozen
Автор

bruh is basically rawdogging matrix floaties^^
i love this type of skill.

alexs
Автор

Whoa, I've never Heard of this technique. This is crazy interesting

tommyflavio
Автор

oh so that’s what they’re doing in Severance

kenny_harmon
Автор

Cool and all, but how are the dimensions of the visual representation, i.e. width and height of the visualized binary file image, being taken into account?

InternetCatCompilations
Автор

Ah yeah. I just did that with the text column of a hex editor. To some degree you can see this kind of stuff there too. A repeating pattern for some tables, some slowly changing repeated bytes for bitmap images. Doesn't work if the file is to huge, though, because you're always "zoomed in" to the max.

bloody_albatross
Автор

Very Cool. I'm going to try this tool on some original steganography ideas I've been working on. Today I successfully managed to insert obfuscated GIF image data into a PNG image without corruption, so I'm pretty excited. No algorithms or libraries, just Notepad ++.

lancemarchetti
Автор

data visualization it's always beautiful

chefaku
Автор

First time I saw this was watching Scanlime analyse a firmware image by loading it into Photoshop as an image. She could see the various sections and see which might have been compressed or encrypted. It was pretty cool.

UncleWalter