kaimi.ru
Kaimi | Misc
https://kaimi.ru/author/kaimi
Решаем простой CrackMe с помощью angr. Понедельник, 2. Май 2016. Не так давно мне попался на глаза занимательный Python-фреймворк под названием angr. Он предназначен для анализа всевозможных исполняемых файлов под различные платформы. И, несмотря на незнание мной Python'а и нелюбовь к паскаледобному синтаксису, я все же решил потратить некоторое время на его изучение, так как на одном CTF'е. Увидел занятный вариант решения задания по реверс-инжинирингу с его использованием. Воскресенье, 3. Январь 2016.
sean.heelan.io
seanhn – Sean Heelan's Blog
https://sean.heelan.io/author/seanhn
Sean Heelan's Blog. Program analysis, verification and security. Tracking Down Heap Overflows with rr. May 31, 2016. June 1, 2016. Anyone who’s spent time doing vulnerability analysis on C/C has had the experience of floundering around in a debugger for hours on end trying to figure out the source of a mysterious crash. For example, lets say we’re analysing an interpreter, e.g. And the following occurs: an API call triggers a function containing a bug, and a write to buffer. 8217; Taint tracking solution...
sec-wiki.com
固件分析工具汇总--SecWiki 专题
https://www.sec-wiki.com/topic/55
blog.trailofbits.com
Exploits – Trail of Bits Blog
https://blog.trailofbits.com/category/exploits
Trail of Bits Blog. 4E78 641E 4054 5085 81B6 5712 6BA3 5E19 0B22 E10F. A fuzzer and a symbolic executor walk into a cloud. August 2, 2016. Finding bugs in programs is hard. Automating the process is even harder. We tackled the harder problem and produced two production-quality bug-finding systems: GRR, a high-throughput fuzzer, and PySymEmu (PSE), a binary symbolic executor with support for concrete inputs. Let’s dive in and see the challenges we faced when designing and building GRR and PSE. Below are t...
ntddk.github.io
Tag: symbolic execution | 一生あとで読んでろ
http://ntddk.github.io/tags/symbolic-execution
Angr, AFL, Driller. 今年のセキュリティ キャンプでは,うっかり なぜマルウェア解析は自動化できないのか という題の講義を行ってしまったが,それだけセキュリティの世界には自動化の波が来ている 本稿では,脆弱性分析の自動化をめざして開発されているangr, AFL, Drillerをざっくり紹介する. はIEEE S&P 2016に採択されている 手法の新規性というよりは実装力でゴリ押しするタイプ 評価には,アメリカ国防高等研究計画局が5,500万ドル 約56億円 の資金を投じてまで開催した脆弱性分析 修正の自動化コンペ, DARPA Cyber Grand Challenge. CGC) のデータセットが用いられている CGCの決勝戦に進出したチームには75万ドル 約7,600万円 ,優勝したチームは200万ドル 約2億円 が与えられる angr開発の目的のひとつが,CGCでの勝利にあることは疑いようもない 最終的な戦績は,CMUのツールMAYHEMに優勝を譲って3位だったが. P = angr.Project(sys.argv[ 1. Explicit name = True.
zv.github.io
My Knuth Check or How I learned to love symbolic computing
http://zv.github.io/note/knuth-check
My Knuth Check or How I learned to love symbolic computing. I recieved this Knuth reward check. For a remark I sent to Knuth about a to a particular SAT-solving heuristic concerned with the selection of decision literals, which has advanced the state of the art for the fairly obscure problem of Aurifeuillean factorization. As well as an interactive development environment for SAT Solvers and SMTLIBv2. I've personally used such solvers in the service of checking real-world. Have been used to automatically...
ctfhacker.com
CTF Hacker - Spreading the knowledge
http://ctfhacker.com/ctf/python/symbolic/execution/reverse/radare/2015/11/28/cmu-binary-bomb-flag2.html
CMU Binary Bomb meets Symbolic Execution and Radare. On ctf, python, symbolic, execution, reverse, and radare. Symbolic execution has been a topic I have been meaning to jump into for a few months. Today we will look at how to apply symbolic execution to the Carnegie Melon Binary Bomb lab. This entire writeup was performed in my Vagrant CTF VM EpicTreasure. Which comes prepackaged with the tools necessary. Where we can apply SMT solvers. To determine a correct input. Go, Go Gadget Radare! A good first st...