====== Reverse Code Engineerng ====== {{template>:project:infobox| name=RCE| image=rce.png| sw=| hw=| founder=root| interested=[[user:biiter]]\\ [[user:ruza]]| status=dead }} ~~META: status = active &relation firstimage = :project:rce.png ~~ ===== Goals of the Project ===== * security research * education ===== Walkthroughs ===== ==== Can You Crack It? ==== 16.12.2011 20:00 - [[http://www.doodle.com/nqfewpvfm5a7g7is|date vote poll]] \\ Provedeni resenim challenge http://canyoucrackit.co.uk. \\ Postupne si vysvetlime co se po nas v zadani chtelo a jak se to melo resit. ===== Tools ===== * http://immunityinc.com/products-immdbg.shtml * http://www.hex-rays.com/products/ida/support/download_freeware.shtml ===== Crackmes ===== * http://www.binary-auditing.com/ ===== Resources ===== * http://www.openrce.org/reference_library/ * http://www.woodmann.com/ * http://vx.netlux.org/ ===== Recommended readings ===== * http://sts.synflood.de/dump/doc/RE_I.txt * http://sts.synflood.de/dump/doc/RE_II.txt * http://hexblog.com/files/recon%202010%20Skochinsky.pdf * http://thelegendofrandom.com/blog/sample-page ===== Lectures ===== Date to be announced. 1. from boot to root * x86 boot process (modes) * grub * kernel main * init * rc.d * root 2. running process * elf * loader (libraries) * environment (input/ipc) * syscalls (process/kernel) * library call (.plt) 3. debugging * ltrace * strace * ptrace * gdb * basic disassembly 4. creating program * memory layout * stack * heap * object placement (variables in memory) * gcc 5. reverse engineering * advanced disassembly * basic constructions (functions) * code flow control * de/obfuscation * examples 6. vulnerability exploitation * buffer * types * shellcode * pwn * examples 7. code review * taossa * secure coding * xorl 8. vulnerability discovery * code review * documentation * fuzzing