Jörg Kleinophorst

16 Followers
183 Following
36 Posts
@SebastianWalla, Steffen Haas, @tillmannwerner, and myself will present a .NET instrumentation framework tomorrow at @recon 2025 in Montreal. Here's a humble brag sneak peek demo-ing how easy it is to write a function tracer!

As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis:

https://github.com/binref/refinery/blob/master/tutorials/tbr-files.v0x08.flare.on.10.ipynb

refinery/tutorials/tbr-files.v0x08.flare.on.10.ipynb at master · binref/refinery

High Octane Triage Analysis. Contribute to binref/refinery development by creating an account on GitHub.

GitHub
Now that #flareon10 ended, I pushed my notes & write-ups to https://github.com/jk45054/CTF-writeups/tree/main/Flare-On%2010
Detailed walkthroughs for 7, 10, 12 and 13. Also some raw-ish notes and python solve scripts for all others. It's been great fun - and only 10,5 months to FlareOn 11!
Thanks
@nickharbour
& team
CTF-writeups/Flare-On 10 at main · jk45054/CTF-writeups

Writeups for CTF challenges. Contribute to jk45054/CTF-writeups development by creating an account on GitHub.

GitHub
As it turns out, compilers happily spill the index for indirect jumps through a jump table after bounds checking, creating a TOCTTOU race for arbitrary control-flow hijacking. Check out our IEEE SSP "WarpAttack" paper: https://nebelwelt.net/files/23Oakland3.pdf

I'm excited to announce that I'll be presenting my talk, "Unveiling Secrets in Binaries using Code Detection Strategies" at REcon Montreal 2023 (@recon)! This talk explores the challenges reverse engineers face when navigating large, unknown binaries and introduces a range of efficient, architecture-agnostic heuristics for quickly detecting key code locations in real-world applications.

During the presentation, I'll demonstrate how these innovative heuristics can identify cryptographic algorithms, complex state machines in firmware, and string decryption routines in malware. Additionally, we'll delve into detecting API functions in statically-linked executables and uncovering obfuscated code in commercial applications. These powerful techniques are based on code complexity metrics and statistical analysis, making them applicable to a wide array of reverse engineering scenarios.

For those interested in diving deeper into the world of software protection and how to break them, I'll also be conducting a hands-on training session on "Software Deobfuscation Techniques." More details and sign-up information for the training can be found here: https://recon.cx/2023/trainingSoftwareDeobfuscationTechniques.html

Check out the full details of my talk at the conference page: https://recon.cx/2023/presentations.html and stay tuned for more updates coming soon!

#reverseengineering #malware #malwareanalysis #softwaresecurity #REcon2023

Recon Training - Software Deobfuscation Techniques by Tim Blazytko

REcon # Montreal Security Conference # Reverse Engineering Training

We need everyone in the media to reinforce the fact that #LargeLanguageModels like #ChatGPT are programmed to generate text in response to a prompt, not answer questions factually. They could digest the most reliable sources available and still create 100% bogus results, a phenomenon popularly called #hallucination.

I have written a brief article explaining how compilation units matching work in #Diaphora:

https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md

diaphora/compilation_units.md at master · joxeankoret/diaphora

Diaphora, the most advanced Free and Open Source program diffing tool. - diaphora/compilation_units.md at master · joxeankoret/diaphora

GitHub

New version of my #binaryninja to identify obfuscated code. Besides major performance improvements it includes a new heuristic to detect frequently called functions which identifies string decryption and API hashing routines in #malware.

Code: https://github.com/mrphrazer/obfuscation_detection

GitHub - mrphrazer/obfuscation_detection: Binary Ninja plugin to identify obfuscated code and other interesting code constructs

Binary Ninja plugin to identify obfuscated code and other interesting code constructs - mrphrazer/obfuscation_detection

GitHub
python memfd_create() oneliner:

python3 -c "import os;os.fork()or(os.setsid(),print(f'/proc/{os.getpid()}/fd/{os.memfd_create(str())}'),os.kill(os.getpid(),19))"

This prints the path of a memfd, which you can use to do whatever you want (like fileless ELF execution!)

📢 In a recent report, Microsoft Digital Threat Analysis Center (DTAC) attributes a recent influence operation targeting French satirical magazine Charlie Hebdo to an Iranian nation-state actor, NEPTUNIUM.

💧 In January, a hacker group known as "Holy Souls" claimed to have obtained the personal information of over 200,000 Charlie Hebdo customers. They released a sample of the data, which included full names, telephone numbers, and email and home addresses, putting subscribers at risk of targeting by extremist organizations.

🛡️ To help against these influence operations, DTAC also released their Influence Attribution Framework. This tool helps organizations understand, attribute, and mitigate the impact of these operations. For more information on how the framework works, I've put together a simple infographic that summarizes its key components. 👇 #microsoft #threatintelligence #influence #infosec #cybersecurity #microsoftsecurity

📰 Report: https://lnkd.in/gwp7Aq9m

⚙ Framework: https://lnkd.in/gVuv6D8S

Iran responsible for Charlie Hebdo attacks | Security Insider

Today, Microsoft’s Digital Threat Analysis Center (DTAC) is attributing a recent influence operation targeting the satirical French magazine Charlie Hebdo

Security Insider