Dec. 5, 2023, 2:03 p.m. | Emmaline

Blog - Praetorian www.praetorian.com

Overview Recently, we decided to perform some reverse engineering of the SonicWall NSv appliance to identify any potential remote code execution vulnerabilities within the appliance. During our initial analysis of a virtual machine image for the application, we discovered a customized LUKS encryption mechanism meant to hinder reverse engineering of the application. We were able […]


The post Analyzing the SonicWall Custom Grub LUKS Encryption Modifications appeared first on Praetorian.

analysis application code code execution encryption engineering identify image luks machine mechanism modifications remote code remote code execution reverse reverse engineering sonicwall virtual virtual machine vulnerabilities vulnerability research

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC