19 posts in archive

Profiling Windows execution with system timeless analysis

05 Nov 2020 by Louis and tdta - REVEN - Performance REVEN Profiling Use case

An unused system is not a suspended system! Discover in this article how we measured some Windows 10 background activity with timeless analysis in various configurations. The multiple applications of system-wide timeless analysis range from the obvious, like “a debugger you don’t have to restart all the time”, the less...

Buffer overflow exploitation in Quick Player 1.3 (unicode & SEH)

06 Oct 2020 by Quentin - REVEN - Reverse Engineering REVEN Exploit Buffer overflow

In this article, we will talk about the exploitation of a buffer overflow in Quick Player 1.3 leading to an arbitrary code execution, and how we fixed an already existing exploit using REVEN. We will first present the exploit, then explain why it did not work at first, and how...

Announcing REVEN version 2.6

15 Sep 2020 by Louis and Marc - Reven - Reven Announcement Releases

Tetrane is pleased to announce that the release of REVEN 2.6 Enterprise and Professional is available. REVEN is an automated Reverse Engineering Platform designed to go x10 faster & x10 deeper using Timeless Analysis. Technically, REVEN captures a time slice of a full system execution (CPU, Memory, Hardware events) to...

Interactive write-ups with REVEN and Jupyter

09 Sep 2020 by Louis - Tutorial - Reverse Engineering Analysis API Reven

OK, so you just recorded this nice trace of the latest malware-of-the-week, great! You went around the timeline in Axion, did some symbol search, it all looks very promising. Time to dive into the depths of the analysis… What was the name of that function again? The one that’s probably...

Timeless Full-System analysis with REVEN and WinDbg

03 Sep 2020 by Louis - Tutorial - Reverse Engineering Reven WinDbg

REVEN 2.5 introduced a new integration between REVEN and Microsoft WinDbg. This integration brings WinDbg and REVEN closer together, allowing you to access a REVEN trace as if it were a live VM and benefit from REVEN’s full-system timeless analysis and full-fledged scripting API, together with WinDbg’s familiar debugger interface....

Getting ready for analysis with REVEN (3/3): Finalizing the Workflow

30 Jul 2020 by Louis - Tutorial - Workflow API Scenario recording

This video article is part of a series on virtual machine configuration for use with REVEN: Importing a VM Lightening the VM for more efficient scenario recording Finalizing the configuration workflow (this article) Today’s video contains the last, but not least steps required in the configuration of a VM for...

Getting ready for analysis with REVEN (2/3): Lightening of the VM

28 Jul 2020 by Louis - Tutorial - Workflow API Scenario recording

This video article is part of a series on virtual machine configuration for use with REVEN: Importing a VM Lightening the VM for more efficient scenario recording (this article) Finalizing the configuration workflow Today’s video is about an unsuspected, yet very important step in the VM configuration process: VM lightening...

Getting ready for analysis with REVEN (1/3): Importing a new VM

23 Jul 2020 by Louis - Tutorial - Workflow API Scenario recording

Among all RE tasks, setting up the environment is a tedious, but necessary step. With the recent release of REVEN 2.5, getting up to start with your first scenario is now easier than ever! This series of video articles will guide you through the process of configuring a virtual machine...

Tracing network data back to encryption

16 Jul 2020 by Mathieu - Reven - Reverse Engineering Malware Analysis Analysis API Taint Reven

In this video, we demonstrate how REVEN makes it possible to connect data sent through the network with the code that generated it beforehand. In our case, this reveals a decryption routine in a malware. The first step is to reconstruct a usable PCAP file from the trace to explore...

Announcing REVEN version 2.5

25 Jun 2020 by Marc - Reven - Reven Announcement Releases

Tetrane is happy to announce the release of REVEN 2.5 Enterprise and Professional. REVEN is an automated Reverse Engineering Platform designed to go x10 faster & x10 deeper using Timeless Analysis. Technically, REVEN captures a time slice of a full system execution (CPU, Memory, Hardware events) to provide unique analysis...

Automated analysis of crashes or malware, and integration with fuzzers

06 May 2020 by Mathieu - Tutorial Automation - Demo Automation Workflow API Analysis API Scenario recording

Analyzing a crash within a fuzzing process or not, capturing and analyzing malware activities, those tasks can now be fully automated with REVEN. It’s also easy to plug it into your tool chain or customize it. This demo presents the entire automated workflow: starting a VM. loading and launching the...

REVEN DEMO - Comparing the dynamic execution on 2 systems (3/3)

23 Apr 2020 by Mathieu - Tutorial - Demo Reven

This video continues the analysis of CVE-2019-1347. It demonstrates how to compare 2 executions, on a vulnerable system vs non-vulnerable system to extract valuable information about the vulnerability. The first video demonstrated how to move quickly from a system crash to the input file responsible and the WinDbg Integration. The...

REVEN DEMO - Taint and IDA Integration (2/3)

21 Apr 2020 by Mathieu - Tutorial - Demo Reven

This video continues the analysis of CVE-2019-1347. This part of the demo uses data flow tainting forward. It also shows the IDA integration to get both the static & the dynamic view of the application under analysis. The first video demonstrated how to move quickly from a system crash to...

REVEN DEMO - From a crash to the input file and WinDbg Integration (1/3)

15 Apr 2020 by Mathieu - Tutorial - Demo Reven

In this video, we show how to quickly move from a system crash to the input file at its origin. It demonstrates the usage of REVEN features like the data flow tainting and the integration with WinDbg. This demo is related to the CVE-2019-1347 (“When a mouse over a file...

REVEN Tainting and APIs for automation

07 Apr 2020 by Louis - Tutorial Automation - Demo Reven API

This demo focuses on 2 areas: The REVEN data flow tainting feature that makes it easy to follow data across processes using IPC or local network communications The REVEN Python API to automate analysis tasks, used here for data tainting. The example is based on the application Tokio chat with...

Recording a Crash with REVEN Project Manager

24 Mar 2020 by Mathieu - Tutorial - Demo Reven Scenario recording

In this video, we will have a look at the Project Manager UI, which is the tool REVEN provides to enable users to manage virtual machines and scenarios. As far as scenarios are concerned, the Project Manager allows to record scenarios and generate data resources for the RE analysis. We...

Analyzing CVE-2018-8653 with REVEN: Use-after-Free in Internet Explorer Scripting Engine

10 Mar 2020 by Luc - Technical - Use After Free UaF Reverse Engineering Garbage Collector Memory Management CVE Demo Reven

In this post we will have a look at the proof of concept for CVE-2018-8653 that comes from a very interesting blog post from Philippe Laulheret et al. at MacAfee Labs. To summarize, the vulnerability exploits various seemingly innocent behaviors in Internet Explorer’s scripting engine (jscript.dll) to trigger a use-after-free...

Tetrane launches REVEN Professional Edition

04 Feb 2020 by Marc and Benoit - Reven - Reven Announcement Releases

Tetrane launches REVEN Professional Edition! You were many to request and wait for a lighter, more accessible, more affordable version of REVEN. Here it is! REVEN Professional Edition democratizes full-system timeless analysis for vulnerability and malware analysis. Now, it is directly available for purchase on TETRANE website REVEN Professional Edition...

Analysis of CVE-2019-0708, a.k.a. BlueKeep, with REVEN: Another point of view

22 Jan 2020 by Luc - Technical - Use-after-free UaF Reverse Engineering Garbage Collector Memory Management CVE Demo Reven

Bluekeep (CVE-2019-0708) is a security vulnerability that was discovered in Microsoft’s Remote Desktop Protocol, which allows remote code execution. At least one analysis already describes precisely this vulnerability with a specific approach. This blog post aims to demonstrate how REVEN can be used to analyze the crash, the root cause...