Welcome to our blog

In this blog we will cover some of our reverse engineering and research work.

follow us on twitter @tephracore

Tactical Malware Analysis (TMA)

Introducing our unique malware training class

Tactical Malware Analysis - Course Objectives After completing this course students will be able to independently solve following problems: Frame the analysis objectives. Use a combination of static and dynamic analysis to perform objectives. Automate analysis process. Deliver a complete intelligence product. Introduction Welcome to Tactical Malware Analysis (TMA) course! This unique Tactical Malware Analysis course covers all aspects of an attacker kill-chain by an intermediate or advanced adversary. [Read More]

MalwareTech vm1 challenge

write up for vm1 challenge

What is this about? This is an unoficial write up of the vm1 challenge, it is part of the malware reversing challenges by MalwareTech, the list of challenges can be found here Solving vm1 challenge: Note: Dynamic execution isn’t allowed for this challenge. We will have to build our own vm interepreter. let’s go ahead and download vm1.zip and decompress it, we should get vm1.exe which is the main executable: [Read More]

BSidesSF 2019 CTF

write up runit and runitplusplus

What is this about? This is a binary exploitation and reversing challenge for both runit and runitplusplus, this blog post is an unofficial write up of these two challenges. Solving first challenge: runit let’s start with runit: shasum -a 256: 14609b8165079a24f83c93128659cd08108eddfd48a3b8a9f43e10e225253c11 Can be downloaded in our github here. This flag solution can be downloaded from here. The flag server is: runit-5094b2cb.challenges.bsidessf.net:5252 Opening this runit challenge in IDA pro, reveals the following disassembly: [Read More]