Register yourself if you have not yet. Access the challenge at http://ringzer0team.com/challenges/11 Download the subject,  the checksum: f6816b590d2021a16ba8005aa235e6a3 (md5) b8c18db3e4678e09683e3b20e9004d1183c2420b (sha1) The challenge clearly instruct as to utilize GDB. In this case, I have customize my GDB using init script which can be downloaded from my github. After downloading the binary, ran ‘file’ then ‘readelf’ […]

Read More →

Here is my presentation of student’s final project as requirement for graduation from Institut Teknologi Bandung (ITB). The slides would be in Indonesian Language. The title would be “Analisis Keamanan dalam Pengembangan Sistem Transaksi ATM Menggunakan Otentikasi Pembuluh Darah” or in English it would be “Security Analysis on ATM System Development using Vein Authentication” — […]

Read More →

Have you ever want to try system other than your PC? MIPS for example. As a reverse engineer, I sometimes want to run a MIPS Linux system so that I can observe, develop, and testing somethings. However, I don’t have much room for another device, so virtualization might be a solution. In this article we […]

Read More →

Edit: I had update the article to build from latest package and testing. You might notice that I had written an article before about building QEMU from source. That one is QEMU KVM (Kernel Virtual Machine).  As per version version 1.3 QEMU-KVM is merged to upstream QEMU project therefore the QEMU-KVM is no longer maintained. […]

Read More →

Windows, up until today, is still popular Operating System and have large market. This Microsoft’s product is designed for end-user and reducing complexity of Operating System. Even when some other OS such as Linux and Mac OS starts invading, this Operating System is still major and fanatically used by some people in the world. In […]

Read More →

Computer criminals are always ready to compromise weakness in the system with their hostile codes. Computer Viruses, Worms, Trojans, Malwares, you name it. Often these programs are custom compiled and not widely distributed. Because of this, anti-virus software won’t detect their presences. In this article we will try to outlines the process of reverse engineering […]

Read More →