Wed, 01/19/2022 - 10:45During my 6-months intership, I developed a tool to ease vunerability research on Java applications. I used several software and libraries, and faced a number of issues throughout the development of this tool, Captain Hook. This article describes Captain Hook's development process from the beginning along with its challenges.
Fri, 01/14/2022 - 18:01Why you never managed to connect to this fre*king NTLM EPA protected website and how to finally reach it.
Fri, 09/17/2021 - 16:06Reverse-engineering a hashing mechanism and optimizing password cracking
Fri, 07/30/2021 - 09:11This is the last part of series, where we solve the challenge using our symbolic interpreter, and an external SMT solver. Huge success!
Wed, 07/28/2021 - 10:00In this installment, we turn the concrete interpreter into a symbolic interpreter. How exciting!
Fri, 07/23/2021 - 10:05In the second part of this series, we write a concrete interpreter for a subset of WebAssembly.
Mon, 07/19/2021 - 19:01Writing a symbolic interpreter, and wiring it to a solver in order to solve reverse engineering challenges (or other uses), might seem like a daunting task. Even simply using an existing symbolic interpretation framework is far from easy when one has no experience in it. This serie of articles will describe, throughout the summer, how such an engine is built, and showcase implementation tricks and some trade offs to be aware off. Do not worry, the interpreter will be kept as simple as possible though! In the end, we...
Wed, 12/23/2020 - 08:09In this article we share technical details on how Kraqozorus automatically generates password cracking strategies that improve both the number of cracked hashes and time required to run the attacks.
Tue, 12/15/2020 - 13:25Lumina is a built-in function recognition feature of the well-known IDA pro disassembler that relies on an online signature database. Unfortunately, the database server is not available for local private use. Have you ever raged at a misstyped hotkey that sent your database content to the Lumina servers, wondered how it works, what kind of data is sent, and wished for a local server under your control? This blog post might answer some of your questions.
Thu, 05/14/2020 - 09:50We wrote a new tool that automates the creation of efficient mutation rules for password crackers, such as John the Ripper or hashcat. This posts describes the high level ideas behind this tool, along with some history. If you just want to use it, check our Github repo!