Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 2 days ago

Reversing BEDaisy.sys: Static Analysis of BattlEye’s Kernel Anti-Cheat Driver

s4dbrd.github.io

external-link
message-square
0
link
fedilink
3
external-link

Reversing BEDaisy.sys: Static Analysis of BattlEye’s Kernel Anti-Cheat Driver

s4dbrd.github.io

digicatM to blueteamsecEnglish · 2 days ago
message-square
0
link
fedilink
In the first post I covered how kernel anti-cheat systems work at an architectural level: the callbacks they register, the memory scanning they perform, the detection techniques they use. All of that was theoretical, with small proof-of-concept drivers and WinDbg demos to illustrate each concept. This post is the practical follow-up. I wanted to take one real, production anti-cheat driver and see how much of its internals I could recover through static and dynamic analysis.
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 52 users / day
  • 103 users / week
  • 348 users / month
  • 957 users / 6 months
  • 228 local subscribers
  • 650 subscribers
  • 2.63K Posts
  • 212 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.16
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org