-

Rustversing 1
Why? you may ask. I had asked myself the same question, but a friend provided me with a different perspective. In the early days of reversing, back in the 80s (I guess?), people didn’t know how to reverse a simple C binary like we do today. They started by examining plain disassembly, gradually progressing to…
-
The Shellcode Blacksmith
Welcome to the first post of my series on various low level topics. In this series, I will focus as deeply as possible into more advanced topics, rather than simply explaining common vulnerabilities like SQL injection or XSS. Instead, I’ll be focusing on subjects that I find more interesting. Since this is my first post of this…
-
WannaCry | Triage
Name Sample Link Personal Rating * MD5 Hash WannaCry Github PMAT Husky 6.5 db349b97c37d22f5ea1d1841e3c89eb4 This rating is take from the moment I did this analysis. In the time being, this can change because my skills have progressed. Only take it as a point of view of this moment. Static Hashes First, we get the file hashes:…
-
SillyPutty | Triage
Name Sample Link Personal Rating * MD5 Hash SillyPutty GitHub PMAT Husky 3.0 334a10500feb0f3444bf2e86ab2e76da *This rating is take from the moment I did this analysis. In the time being, this can change because my skills have progressed. Only take it as a point of view of this moment. Static Analysis We start with a Putty binary. At first…



