Reverse Code Engineerng

RCE
founder: root
depends on:
interested: biiter
ruza
software license:
hardware license:
status: dead

Goals of the Project

  • security research
  • education

Walkthroughs

Can You Crack It?

16.12.2011 20:00 - date vote poll
Provedeni resenim challenge http://canyoucrackit.co.uk.
Postupne si vysvetlime co se po nas v zadani chtelo a jak se to melo resit.

Tools

Crackmes

Resources

Recommended readings

Lectures

Date to be announced.

1. from boot to root

  • x86 boot process (modes)
  • grub
  • kernel main
  • init
  • rc.d
  • root

2. running process

  • elf
  • loader (libraries)
  • environment (input/ipc)
  • syscalls (process/kernel)
  • library call (.plt)

3. debugging

  • ltrace
  • strace
  • ptrace
  • gdb
  • basic disassembly

4. creating program

  • memory layout
  • stack
  • heap
  • object placement (variables in memory)
  • gcc

5. reverse engineering

  • advanced disassembly
  • basic constructions (functions)
  • code flow control
  • de/obfuscation
  • examples

6. vulnerability exploitation

  • buffer
  • types
  • shellcode
  • pwn
  • examples

7. code review

  • taossa
  • secure coding
  • xorl

8. vulnerability discovery

  • code review
  • documentation
  • fuzzing
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki