Blog home Search
logologoGo to homepage
  • Technology
  • Features
  • Demos
  • Pricing
  • Resources
    • Helpdesk & FAQ
    • Documentation
    • Github
  • Company
    • About
    • Contact
  • Blog
Blog home Search
Subscribe to What's New Subscribe to What's New
Recent posts
  • Who corrupted the data! Get a fast and precise answer with the taint
  • REVEN OpenLab - Feb 18th, 2021
  • Detecting Buffer-Overflow vulnerabilities using REVEN
Categories
  • Reven (18)
  • Technical (18)
  • Tutorial (13)
  • Automation (2)
  • Conference (2)
  • All posts (50)
Tags
  • Axion (7)
  • Reven (43)
  • Reverse engineering (29)
  • Taint (9)
  • Use after free (1)
  • Flash (1)
  • Swf (1)
  • Reven axion (1)
  • Plugin (1)
  • Deobfuscation (3)
  • Ctf (1)
  • Ctf (2)
  • Bsod (1)
  • Kernel (2)
  • Race-condition (1)
  • Cve (9)
  • Adobe flash (1)
  • Demo (13)
  • Patchguard (1)
  • Exploit (3)
  • Windows kernel (3)
  • Scripts (1)
  • Windows boot (1)
  • Uefi (1)
  • Malware analysis (2)
  • Releases (6)
  • Announcement (6)
  • Automation (3)
  • Analysis api (7)
  • Workflow api (5)
  • Pe (1)
  • Parsing (1)
  • Pte (1)
  • Syscall (1)
  • Script (1)
  • Ossi (1)
  • Oob (1)
  • Read overflow (1)
  • Use after free (2)
  • Uaf (2)
  • Garbage collector (2)
  • Memory management (2)
  • Scenario recording (5)
  • Api (1)
  • Windbg (1)
  • Buffer overflow (2)
  • Performance (1)
  • Profiling (1)
  • Use case (1)
  • Vulnerability detection (2)
  • Use cases (1)
  • Cryptography (1)

1 post in archive

Unfolding obfuscated code (part 1)

01 Oct 2016 by tdta, Fred, Mathieu, Benoit - Technical - Reverse Engineering Deobfuscation CTF REVEN

This article is the first one in a series of two. We present an overview of some reverse engineering capabilities of REVEN-Axion, applied to a publicly available challenge, namely F4b_XOR_W4kfu, the most valued at Grehack 2015’s CTF contest (500 points). A more detailed write-up will be published soon for those interested....

©2019 Tetrane