SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Glasgow Reversing Club

   Are you an experienced reverser?
   Do you want to learn how to reverse?
   You even don't know what reversing is?
        JOIN the Glasgow reversing club:
        send an empty email to: revinkilt-subscribe@quebbyworld.com
   If you want to know more:
       A short introduction to reversing
       Club activities
       Subscribe to the mailing list
       About me
Reversing in brief
   Reverse Engineering is also known as RE or RCE
       RE: Reverse Engineering
       RCE: Reverse Code Engineering
   RE is the process of understanding an existing
    product
   Malware analysis and security research often
    involves RE
   The next step of RE is patching: modifying the
    existing product
   Product: any software program or hardware
    device
Uses of Reverse Engineering

   Malware analysis
   Security / vulnerability research
   Driver development
   Compatibility fixes
   Legacy application support
Legal use of REV

   Recovery of own lost source code
   Recovery of data from legacy formats
   Malware analysis and research
   Security and vulnerability research
   Copyright infringement investigations
   Finding out the contents of any database
    you legally purchased
Illegal use of REV
   Illegal to reverse engineer and sell a
    competing product
   Illegal to crack copy protections
   Illegal to distribute a crack/registration for
    copyrighted software
   Illegal to gain unauthorized access to any
    computer system
   Copyright protected software is off-limits
    in most cases
   Spyware/Adware with companies behind
    them are included
An easy example:
Banload Malware analisys
   Banload is a malware that was spreading on
    Msn Messanger.
   Banload's main purpose: steal spanish bank
    accounts and of course replicates!
   Reverse engineering it with a debugger
    (OllyDbg) you discover that Banload:
       it's packed with UPX (binary compression)
       it deletes the icpldrvx.js from the system directory
       it downloads the real malware icpldrvx.exe
       set the registry key for autorun
       and then find existing msn opened windows and
        inject malicious url to download the malware
Debugger snippet of code
Run time string decrypt   Malware exe download by
                          URLMON.DLL!URLDownloadToFileA




                          Execute the malware process and set the
                          registry key for autorun
Club work in progress

   What we are doing now:
       setting up an online wiki to share reversing
        tutorials
       setting up the forum
       register to the SRC (session is october)
   What has already done:
       server setup
       subdomain registration
Planned local activities

   Online articles and tutorials
   Live reversing tutorials
   Seminars hold by experts of the reversing
    panorama (which I personally know)
       Antivirus companies (Symantec)
       Hacking Security Teams
   Reversing challenges (on the style of)
       hacking jeopardy
       hacker challenge
Social nerd activities

   Social activities are a must for a nerd
    community
       lock 'a pick
       brew your beer
       multi player games
       hack your favourite console and show off
            example: I connected my wiimote to my lego nxt
             via bluetooth (no really I did it ... )
       hack your favourite something and show off
            example: I connected my toaster online using a
             webservice (I'm serious I did it ...)
European hack meetings

   The most important hack meetings in
    Europe:
       Chaos Computer Club
       What the hack
       Moca
       Cebit
   And in USA:
       Defcon
       BlackHat
About epokh

   Has spent his life in reversing hardware devices
    and software programs and enjoyed it (still ...).
   Grow in the top reverser community in europe:
    quequero
   Member of one of the best c******g team on the
    net for release statistics.
   Proud to be:
       the first java bytecode cracker (it's actually a bit
        lame ....)
       the first skype filter logger (this is very lame )
       ... better to stop :-)

Contenu connexe

Similaire à Glasgow Reversing Club

Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
Priyanka Aash
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
guest66dc5f
 

Similaire à Glasgow Reversing Club (20)

Recent Rogueware
Recent RoguewareRecent Rogueware
Recent Rogueware
 
Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
 
Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)Debugging a .NET program after crash (Post-mortem debugging)
Debugging a .NET program after crash (Post-mortem debugging)
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriageЭкспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
 
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
Static Analysis Techniques For Testing Application Security - Houston Tech FestStatic Analysis Techniques For Testing Application Security - Houston Tech Fest
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
 
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 -  Advanced Malware AnalysisReversing & Malware Analysis Training Part 9 -  Advanced Malware Analysis
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You ThinkHITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
HITCON FreeTalk 2022 - Defeat 0day is not as Difficult as You Think
 
Securing Rails
Securing RailsSecuring Rails
Securing Rails
 
How to become a .net debugging Jedi (.Net Summit, Minsk)
How to become a .net debugging Jedi (.Net Summit, Minsk)How to become a .net debugging Jedi (.Net Summit, Minsk)
How to become a .net debugging Jedi (.Net Summit, Minsk)
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram KharviUnderstanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
Thinking Outside the Sand[box]
Thinking Outside the Sand[box]Thinking Outside the Sand[box]
Thinking Outside the Sand[box]
 
Comment améliorer le quotidien des Développeurs PHP ?
Comment améliorer le quotidien des Développeurs PHP ?Comment améliorer le quotidien des Développeurs PHP ?
Comment améliorer le quotidien des Développeurs PHP ?
 
Javascript Security - Three main methods of defending your MEAN stack
Javascript Security - Three main methods of defending your MEAN stackJavascript Security - Three main methods of defending your MEAN stack
Javascript Security - Three main methods of defending your MEAN stack
 
How to Remove Codec v hijacker
How to Remove Codec v hijackerHow to Remove Codec v hijacker
How to Remove Codec v hijacker
 
Rahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_CodeRahul-Analysis_of_Adversarial_Code
Rahul-Analysis_of_Adversarial_Code
 
Game Programming 05 - Development Tools
Game Programming 05 - Development ToolsGame Programming 05 - Development Tools
Game Programming 05 - Development Tools
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Glasgow Reversing Club

  • 1. Glasgow Reversing Club  Are you an experienced reverser?  Do you want to learn how to reverse?  You even don't know what reversing is? JOIN the Glasgow reversing club: send an empty email to: revinkilt-subscribe@quebbyworld.com  If you want to know more:  A short introduction to reversing  Club activities  Subscribe to the mailing list  About me
  • 2. Reversing in brief  Reverse Engineering is also known as RE or RCE  RE: Reverse Engineering  RCE: Reverse Code Engineering  RE is the process of understanding an existing product  Malware analysis and security research often involves RE  The next step of RE is patching: modifying the existing product  Product: any software program or hardware device
  • 3. Uses of Reverse Engineering  Malware analysis  Security / vulnerability research  Driver development  Compatibility fixes  Legacy application support
  • 4. Legal use of REV  Recovery of own lost source code  Recovery of data from legacy formats  Malware analysis and research  Security and vulnerability research  Copyright infringement investigations  Finding out the contents of any database you legally purchased
  • 5. Illegal use of REV  Illegal to reverse engineer and sell a competing product  Illegal to crack copy protections  Illegal to distribute a crack/registration for copyrighted software  Illegal to gain unauthorized access to any computer system  Copyright protected software is off-limits in most cases  Spyware/Adware with companies behind them are included
  • 6. An easy example: Banload Malware analisys  Banload is a malware that was spreading on Msn Messanger.  Banload's main purpose: steal spanish bank accounts and of course replicates!  Reverse engineering it with a debugger (OllyDbg) you discover that Banload:  it's packed with UPX (binary compression)  it deletes the icpldrvx.js from the system directory  it downloads the real malware icpldrvx.exe  set the registry key for autorun  and then find existing msn opened windows and inject malicious url to download the malware
  • 7. Debugger snippet of code Run time string decrypt Malware exe download by URLMON.DLL!URLDownloadToFileA Execute the malware process and set the registry key for autorun
  • 8. Club work in progress  What we are doing now:  setting up an online wiki to share reversing tutorials  setting up the forum  register to the SRC (session is october)  What has already done:  server setup  subdomain registration
  • 9. Planned local activities  Online articles and tutorials  Live reversing tutorials  Seminars hold by experts of the reversing panorama (which I personally know)  Antivirus companies (Symantec)  Hacking Security Teams  Reversing challenges (on the style of)  hacking jeopardy  hacker challenge
  • 10. Social nerd activities  Social activities are a must for a nerd community  lock 'a pick  brew your beer  multi player games  hack your favourite console and show off  example: I connected my wiimote to my lego nxt via bluetooth (no really I did it ... )  hack your favourite something and show off  example: I connected my toaster online using a webservice (I'm serious I did it ...)
  • 11. European hack meetings  The most important hack meetings in Europe:  Chaos Computer Club  What the hack  Moca  Cebit  And in USA:  Defcon  BlackHat
  • 12. About epokh  Has spent his life in reversing hardware devices and software programs and enjoyed it (still ...).  Grow in the top reverser community in europe: quequero  Member of one of the best c******g team on the net for release statistics.  Proud to be:  the first java bytecode cracker (it's actually a bit lame ....)  the first skype filter logger (this is very lame )  ... better to stop :-)