A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


0 to 31337 Real Quick: Lessons Learned by Reversing the Flare-On Challenge - Blaine Stancill BSides NOVA 2017 (Hacking Illustrated Series InfoSec Tutorial Videos)

0 to 31337 Real Quick: Lessons Learned by Reversing the Flare-On Challenge
Blaine Stancill
BSides NOVA 2017

Malware reverse engineering challenges are a great way to keep reversing skills sharp and learn new techniques. The Flare-On Challenge is one of the most difficult and respected ones out there. Participants must complete ten unique challenges of increasing sophistication over a six-week period. Only 17 people in the US successfully completed this year's challenge, including the two of us. In this presentation, we'll familiarize reversers and non-reversers alike with how to approach challenge problems, and arm them with tools and tricks to successfully solve the types of problems they regularly see. These techniques not only helped solve this year's Flare-On problems, but more importantly, have real-world applicability. Many of the tools and techniques needed to complete the Flare-On challenge are key to understanding and reversing actual sophisticated malware, such as those used by APTs. We'll walk through how we solved several of the most relevant and creative challenges, providing the audience unique reversing insights that can help both experienced reversers and non-reversers augment their skill sets.

Blaine has years of experience reverse engineering, which he has applied to analyzing malicious binaries, including those of APTs. He came to Endgame after working for the DoD where he developed a diverse cybersecurity background including, but not limited to, reverse-engineering and malware analysis. He recently was one of the few who successfully completed the Flare-On Challenge, knocking out each of the ten reverse engineering challenges. He attended The University of North Carolina at Chapel Hill where he obtained both his Bachelor's and Master's in Computer Science. During graduate school Blaine researched and developed a method for finding ROP payloads via static memory analysis.

MalwareMechanic

Back to BSides NOVA 2017 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast