Главная
Study mode:
on
1
Intro
2
Flare-On Challenge
3
Reverse Engineering 101
4
RE 101: Analysis Strategy
5
RE 101: Light vs Deep Static Analysis
6
RE 101: Light vs Deep Dynamic Analysis
7
Analysis Feedback Loop
8
File Type
9
PE File Format
10
Import Hints - What can it do?
11
MSDOS Stub Code: Normal
12
MSDOS Stub Code: Modified
13
MSDOS Header: Modified
14
Why base64?
15
Base64 Encoding: Internals
16
Base64, hmmm..
17
Custom Alphabet
18
MiniDuke (APT29) cont.
19
Simple Encryption
20
XOR Drawbacks
21
Rolling XOR Algorithm
22
Rolling XOR Inverse-Algorithm
23
RC4
24
Hashing - Recognizing
25
Hashing: How to hide constants
26
Hashing - ROR13
27
Hashing - Other uses?
28
Anti-Analysis Techniques
29
Javascript Obfuscation
30
Challenge #10
31
Packers
32
Packer Stub: Challenge #8
33
Anti-Disassembly: Challenge #8
34
Tricking Flow-Oriented Disassemblers
35
Anti-Debugging Checks
36
Conclusion
Description:
Explore lessons learned from reversing the Flare-On Challenge in this comprehensive conference talk from BSides NoVa 2017. Dive into reverse engineering fundamentals, covering analysis strategies, static and dynamic analysis techniques, and the analysis feedback loop. Examine file types, PE file format, and import hints to understand a program's capabilities. Investigate MSDOS stub code variations and header modifications. Delve into encoding techniques, focusing on base64 and its custom alphabets. Study encryption methods, including XOR algorithms and RC4. Learn about hashing techniques and their applications in hiding constants. Discover anti-analysis techniques such as JavaScript obfuscation, packers, anti-disassembly methods, and anti-debugging checks. Gain valuable insights to enhance your reverse engineering skills and tackle complex challenges.

0 to 31337 Real Quick - Lessons Learned by Reversing the Flare On Challenge

Add to list
0:00 / 0:00