Very cool talk on fuzzers - reminds me of what the angr community does:
https://events.ccc.de/congress/2025/hub/en/event/detail/demystifying-fuzzer-behaviour
1/x
*** Update on my personal CyberSec journey
I haven‘t posted a lot recently, which doesn‘t mean I was lazy. The last weeks entertained several CTFs (PlatyPwn, Huntress, hack.lu, UniR) and also some fun professional events and great people with a focus on the EU Cyber Resilience Act (project networks, qSkills, and an event I hosted at my employer).
More in comments.
#ctf #cybersecurity #platypwn #huntress #hacklu #eucra #cra #arm64 #angr #tryhackme #thm #adventofcyber #39c3 #pwncollege
I went back to playing with angr recently, and learned about the CompleteCallingConvention function today. It analyses a binary and for each function found, it prints the calling convention, parameter and return type. Pretty funny!
Picture shows the angr script on the top, analysis of some random CTF binary's function and related ghidra output on the lower half.
Did a presentation today on #symbolicexecution and demo'd some of the fine work by #angr as well as some interesting results from the #vsharp team. Not totally sure how the talk went with the audience; but, I'm trying to decide if I want to make some changes & maybe I put in for the Cactus Con CFP which is currently open.
I think idea be interested in showing some reversing analyses like deobfuscating some obfuscated malware maybe? I'm not sure if my skill with some of these tools is quite there yet though.
Playing more with angr, I got a hint that the "pacman" reverse-engineering challenge from this year's L3ak CTF can be solved with angr, and it can - pretty easy, even. :-)
No writeup but a screenshot... ;-)
#ctf #cybersecurity #angr #l3ak #l3akctf #reverseengineering
After reading angr docs for the better part of the day, I was able to solve OverTheWire's Leviathan levels 1->2 and 6->7. Not 3->4 so far, but that's left for tomorrow. It's definitely an exciting journey!
Wanna join in? Read up at https://docs.angr.io/en/latest/ and drop me a line!
#ctf #cybersecurity #overthewire #leviathan #angr #symbolicexecution
Monday is OverTheWire time.
Today: vortex19->20: check
Solution 1: compile decompiled code and calculate the needed value
Solution 2: use angr to determine the right value for a given input without decompiling
<3 angr