10.14
You may have noticed that I haven’t been posting a lot of articles on this blog recently.
For the last two years I’ve been spending most of my free time at LSE, the computer systems/security lab of the school I’m attending. We recently decided to open a blog dedicated to everything we do at the lab, from security contests writeups to tutorials. This means that I’m posting most of my work on that blog instead of here.
If you’re following this blog, you will probably be interested in following the LSE blog: http://blog.lse.epita.fr/
Some of my articles you may have missed:
- Static analysis of an unknown compression format, in which I explain the steps I followed to reverse engineer a compression scheme without having access to the source code of the compressor or the decompressor
- PythonGDB tutorial for reverse engineering, a small introduction to PythonGDB and its uses in finding security problems in applications as well as tracing software to understand what it does
- Using SAT and SMT to defeat simple hashing algorithms, explaining what SAT solvers are, how to transform a hashing algorithm into a set of logical formulas a SAT solver can operate on, and how to use this knowledge to break simple hashes (don’t expect to crack MD5 with this).
My french readers might also be interested by the videos of 3 of my recent talks I did at our school during this year edition of LSE Summer Week. You can find the recordings on our Youtube channel.
If my studies go well I’ll be leaving LSE in 2013 for a final internship before getting my degree. I should start blogging more on this website then.
Thanks to everyone reading articles on this blog!
Hello delroth,
I’m interested in starting off with reverse engineering and would like a little help in this regard. Would you be able to help out a bit here? Kindly do let me know. Thanks a lot!
If you have any specific questions I’d be happy to answer you by email (my nickname @ gmail) or IRC (delroth @ freenode/efnet) if I can help 🙂