22/11/2023This post showcases a small but very useful tool that can be used to classify expected and suspicious traffic in a network capture file, and, more importantly, what the process is for writing such a tool.
07/11/2023Introducing SHH, Systemd Hardening Helper, a tool written in Rust to automatically build a set of hardening options for a service using runtime profiling.
22/09/2023This article tells our journey inside the ESE database and the NTDS features that led us to produce the ntdissector tool, suitable for offensive and defensive actions.
19/01/2022During my 6-months intership, I developed a tool to ease vunerability research on Java applications. I used several software and libraries, and faced a number of issues throughout the development of this tool, Captain Hook. This article describes Captain Hook's development process from the beginning along with its challenges.
14/01/2022Why you never managed to connect to this fre*king NTLM EPA protected website and how to finally reach it.
17/09/2021Reverse-engineering a hashing mechanism and optimizing password cracking
30/07/2021This is the last part of series, where we solve the challenge using our symbolic interpreter, and an external SMT solver. Huge success!
28/07/2021In this installment, we turn the concrete interpreter into a symbolic interpreter. How exciting!
23/07/2021In the second part of this series, we write a concrete interpreter for a subset of WebAssembly.
19/07/2021Writing a symbolic interpreter, and wiring it to a solver in order to solve reverse engineering challenges (or other uses), might seem like a daunting task. Even simply using an existing symbolic interpretation framework is far from easy when one has no experience in it. This serie of articles will describe, throughout the summer, how such an engine is built, and showcase implementation tricks and some trade offs to be aware off. Do not worry, the interpreter will be kept as simple as possible though! In the end, we...