User Tools

Site Tools


project:rce:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
project:rce:start [2016/11/25 08:30] – ↷ Page moved and renamed from project:rce to project:rce:start ruzaproject:rce:start [2016/11/28 00:36] (current) ruza
Line 1: Line 1:
 +====== Reverse Code Engineerng ======
 +{{template>:project:infobox|
 +name=RCE|
 +image=rce.png|
 +sw=|
 +hw=|
 +founder=root|
 +interested=[[user:biiter]]\\ [[user:ruza]]|
 +status=dead
 +}}
 +
 +~~META:
 +status = active
 +&relation firstimage = :project:rce.png
 +~~
 +
 +
 +===== Goals of the Project =====
 +  * security research
 +  * education
 +
 +===== Walkthroughs =====
 +==== Can You Crack It? ====
 +16.12.2011 20:00 - [[http://www.doodle.com/nqfewpvfm5a7g7is|date vote poll]] \\ 
 +Provedeni resenim challenge http://canyoucrackit.co.uk. \\ 
 +Postupne si vysvetlime co se po nas v zadani chtelo a jak se to melo resit.
 +
 +
 +
 +===== Tools =====
 +  * http://immunityinc.com/products-immdbg.shtml
 +  * http://www.hex-rays.com/products/ida/support/download_freeware.shtml
 +
 +===== Crackmes =====
 +  * http://www.binary-auditing.com/
 +
 +===== Resources =====
 +  * http://www.openrce.org/reference_library/
 +  * http://www.woodmann.com/
 +  * http://vx.netlux.org/
 +
 +===== Recommended readings =====
 +  * http://sts.synflood.de/dump/doc/RE_I.txt
 +  * http://sts.synflood.de/dump/doc/RE_II.txt
 +  * http://hexblog.com/files/recon%202010%20Skochinsky.pdf
 +  * http://thelegendofrandom.com/blog/sample-page
 +===== Lectures =====
 +Date to be announced.
 +
 +1. from boot to root
 +  * x86 boot process (modes)
 +  * grub
 +  * kernel main
 +  * init
 +  * rc.d
 +  * root
 +
 +2. running process
 +  * elf
 +  * loader (libraries)
 +  * environment (input/ipc)
 +  * syscalls (process/kernel)
 +  * library call (.plt)
 +
 +3. debugging
 +  * ltrace
 +  * strace
 +  * ptrace
 +  * gdb
 +  * basic disassembly
 +
 +4. creating program
 +  * memory layout
 +  * stack
 +  * heap
 +  * object placement (variables in memory)
 +  * gcc
 +
 +5. reverse engineering
 +  * advanced disassembly
 +  * basic constructions (functions)
 +  * code flow control
 +  * de/obfuscation
 +  * examples
 +
 +6. vulnerability exploitation
 +  * buffer
 +  * types
 +  * shellcode
 +  * pwn
 +  * examples
 +
 +7. code review
 +  * taossa
 +  * secure coding
 +  * xorl
 +
 +8. vulnerability discovery
 +  * code review
 +  * documentation
 +  * fuzzing
 +