Register yourself if you have not yet. Access the challenge at http://ringzer0team.com/challenges/11 Download the subject,  the checksum: f6816b590d2021a16ba8005aa235e6a3 (md5) b8c18db3e4678e09683e3b20e9004d1183c2420b (sha1) The challenge clearly instruct as to utilize GDB. In this case, I have customize my GDB using init script which can be downloaded from my github. After downloading the binary, ran ‘file’ then ‘readelf’ […]

Read More →

Computer criminals are always ready to compromise weakness in the system with their hostile codes. Computer Viruses, Worms, Trojans, Malwares, you name it. Often these programs are custom compiled and not widely distributed. Because of this, anti-virus software won’t detect their presences. In this article we will try to outlines the process of reverse engineering […]

Read More →