Presence at hack.lu 2012
For the third year we had the chance to participate to REcon 2012.
Here is a summary of the most intelligible talks.
The case for semantics-based methods in reverse engineering
Rolf Rolles started the conference on his predilection subject, semantic analysis of code.
A lengthy introduction reminded us that semantic ...
Some feedback from the HITB 2012 conference
Recently, HITB 2012 took place in Amsterdam (Okura Hotel) and some of us attended.
Impressed by the quality of the conference, we will try to summarize here all presentations that we attended.Also, Sogeti NL organized three challenges (Web application, WiFi and Social Engineering).
Sébastien RENAUD and Kévin ...
Some feedback from the 28C3 conference
Retours sur le 28C3
Voilà un résumé des conférences auxquelles j'ai assisté. Les planches seront rendues disponibles au fur et à mesure. Les conférences sont réparties sur 3 salles en simultané, il a donc fallu faire des choix. Globalement, c'est une des meilleures conférences auxquelles j'ai pu assister, je ne peux ...read more
Hack.lu CTF 2011 Write-up : Scotty's last signal
Another writeup for the excellent Hack.lu 2011 Capture The Flag contest. This one was very unusual, based on a patched NES rom of Super Mario Bros 1.
Scotty's last signal You might have heard about Montgomery Scott, the legendary chief engineer of the U.S.S. Enterprise. What ...read more
Hack.lu CTF 2011 Write-up : FluxScience
This was probably one of the most entertaining challenges of this CTF.A file data.flux is provided. The goal is to analyze a Windows binary to be ableto decrypt this file.
A few informations are given:
Thanks to a former employee of FluxScience (one of our competitors), wemanaged to ...read more
Hack.lu CTF 2011 Write-up : Romulan Business Network
Once again, we participated in the Capture-The-Flag event organized by the FluxFingers team at Hack.lu. Just like last year's CTF, the challenges were fun and original, and we finished up first after 48 hours of rude competition. The challenge here consisted in a little PDF crackme to solve ...read more
Rushing Recon 2011!!!
Training at CanSecWest 2011: Advanced binary deobfuscation
The course will teach you how to overcome state-of-the-art binary obfuscation.
You will see, and learn to defeat :
- traditional junk,
- arithmetic code hiding,
- code flattening,
- and ...