Additions The introduction to chapter 3 Binary types has been added A new article named Dot Net has been added in chapter 3 Updates Fixed a mistake in the Crash Course article, as pointed out by /u/-SQUD- Altered the index page to include links to the introduction of chapter 3 and the Dot Net article … Read more
Additions A new article named Crash course has been added in chapter 2 Updates Removed needles empty lines in the Practical case: Secura Grand Slam CTF “Easy Reverse” Altered the approach for chapter 3 (File types). The new approach includes both the technical information as well as a step-by-step approach for problems. The old approach … Read more
Additions A new article named Practical case: Buffer Overflow 0x01 has been added in chapter 2 To contact me, you can e-mail me at [info][at][maxkersten][dot][nl], send me a PM on Reddit or DM me on Twitter @LibraAnalysis.
Additions A new article regarding Methods and macros: the call stack has been added in chapter 2 A new page has been added to group all the provided additional resources A new page has been added regarding the Frequently Asked Questions A new article has been planned in chapter 1 regarding Compilers and (dis)assemblers A … Read more
Additions A new Practical case: Patch Me 0x01 has been added in chapter 2 In chapter 2, a new article has been planned under the name of Calling conventions Syntax highlighting on all code fields in all articles Updates The index page has been altered to explicitly mention the focus on free and open-source software … Read more
Additions The start of the second chapter, named Conditions and loops, is now published in the course. In chapter 2, a new article has been planned under the name of Crash course. In this article, the most common instructions will be explained. A new practical case has been planned in chapter 2, which refers back … Read more
After the overwhelming positive replies about my write-up from Reddit users on /r/ReverseEngineering and /r/Hacking, I decided to make a series in which I analyse binaries together with insight and additional information on why decisions were made. The “Table of Contents” for these series can be found here and will be updated regularly. For now, … Read more
On the 16th of January 2018, I participated in the CTF of Cisco at DeFabrique in Utrecht. The duration of the CTF was from 10:00 until 15:45, nearly 6 hours. After solving quite some challenges, I managed to secure the second place and won a Raspberry Pi 3 and a couple of Ikea Smart Lamps. … Read more
This year during the 34c3 Congress, I held a lightning talk about Capricorn. During this presentation I asked for suggestions, feedback and possible collaboration. I’m glad to announce that this talk has sparked the interest of multiple people at the congress, but also via e-mail and Telegram afterwards. The conversations that I’ve had afterwards were … Read more
This is the first Malware Analysis I’ve posted, more will follow in the future. The malware has two layers of encryption which I’ve decrypted and analysed. In the report is a link to my Github repository for an automated decryption tool. The report can be downloaded here.