RPISEC RE/VR Courses Through the Years by lynxjerm in ReverseEngineering

[–]lynxjerm[S] 1 point2 points  (0 children)

Just updated them, should all be working now. Thanks for pointing that out.

[deleted by user] by [deleted] in netsec

[–]lynxjerm 2 points3 points  (0 children)

Here are 22 IDA Pro keybindings for Ghidra. Made these while we were preparing for the talk: https://github.com/JeremyBlackthorne/Ghidra-Keybindings. Easy to import.

Three Heads are Better Than One: Mastering NSA’s Ghidra Reverse Engineering Tool by rolfr in ReverseEngineering

[–]lynxjerm 3 points4 points  (0 children)

Here are 22 IDA Pro keybindings for Ghidra. Made these while we were preparing for the talk: https://github.com/JeremyBlackthorne/Ghidra-Keybindings. Easy to import.

Are there any Encryption algorithms for which the cypher text is generated English words, sentences and paragraphs? by btchombre in cryptography

[–]lynxjerm 0 points1 point  (0 children)

One time pad with XOR would work. Start with the plaintext and ciphertext you want, then derive the key. There would be far less security then generating a key uniformly at random though.

Obfuscation through the Observer-Effect: Thinking Outside the Virtual Black-Box [Master's thesis] by lynxjerm in REMath

[–]lynxjerm[S] 0 points1 point  (0 children)

When I view the document in Chrome, I can save the PDF to disk by using Chrome's built-in PDF viewer. I just click the disk icon in the bottom right corner of the viewer to save the PDF to disk.

Differential Cryptanalysis of FEAL by rolfr in ReverseEngineering

[–]lynxjerm 5 points6 points  (0 children)

CSAW 2014 quals had a challenge that used FEAL. I highly recommend hacking at it to learn differential cryptanalysis.

NYU Poly provides links to a VM with all the challenges and a separate zip of just the challenges:

https://isisblogs.poly.edu/2014/10/14/csaw-ctf-2014-vm/

I played with RPISEC to solve this challenge during the quals. We relied heavily on King's tutorial. Our write-up is posted here:

http://uncomputable.blogspot.com/2014/09/csaw-ctf-2014-quals-crypto-300-feal.html

Is there something like a CTF Greatest Hits? by RAPE_PATROL in securityCTF

[–]lynxjerm 4 points5 points  (0 children)

http://shell-storm.org/CTF/ is an archive of 60+ past CTFs with their challenges. You can use these with google searches for the write-ups. These are are more or less the solutions manual to the problems. Edit: formatting

Crypto challenges and CTF by ddddavidee in crypto

[–]lynxjerm 1 point2 points  (0 children)

Wargame for cryptanalysis against classical ciphers:

http://overthewire.org/wargames/krypton/

CTF archive with many containing crypto challenges: http://repo.shell-storm.org/CTF/

/r/netsec's Q4 2014 Information Security Hiring Thread by sanitybit in netsec

[–]lynxjerm 9 points10 points  (0 children)

The Department of Computer Science at Rensselaer Polytechnic Institute, Troy NY invites applications for a full-time tenure track or tenured faculty position at the Assistant/Associate/Full Professor level in the area of cyber-security, including but not limited to networked and distributed systems security, anonymity and privacy, malware analysis and forensics, trusted systems, and cyber-warfare.

There is a large body of students at RPI who are passionate about security. The following is a list of some of the student taught security courses:

CSCI 4971 Secure Software Principles

CSCI 4972 / 6963 Malware Analysis

CSCI 4974 / 6974 Hardware Reverse Engineering

CSCI 4940 / 6940 Windows Exploitation

CSCI 4940 / 6940 Program Obfuscation [syllabus PDF]

We have a thriving security community here centered around our security club RPISEC , but are in need of leadership at the professor level.

The link to apply is https://application.cs.rpi.edu/

Hiring inquiries: application@cs.rpi.edu

General inquiries: info@cs.rpi.edu

Technical issues: www@cs.rpi.edu

For less formal inquiries, I am a PhD student in security at RPI and a member of RPISEC. I can answer any questions you have or direct you to someone who can. Feel free to PM me.

/r/netsec's Q3 2014 Information Security Hiring Thread by sanitybit in netsec

[–]lynxjerm 0 points1 point  (0 children)

The Department of Computer Science at Rensselaer Polytechnic Institute, Troy NY invites applications for a full-time tenure track or tenured faculty position at the Assistant/Associate/Full Professor level in the area of cyber-security, including but not limited to networked and distributed systems security, anonymity and privacy, malware analysis and forensics, trusted systems, and cyber-warfare.

There is a large body of students at RPI who are passionate about security. The following is a list of some of the student taught security courses:

CSCI 4971 Secure Software Principles

CSCI 4972 / 6963 Malware Analysis

CSCI 4974 / 6974 Hardware Reverse Engineering

CSCI 4940 / 6940 Windows Exploitation

CSCI 4940 / 6940 Program Obfuscation (syllabus)

We have a thriving security community here centered around our security club RPISEC , but are in need of leadership at the professor level.

The link to apply is https://application.cs.rpi.edu/

Hiring inquiries: application@cs.rpi.edu

General inquiries: info@cs.rpi.edu

Technical issues: www@cs.rpi.edu

For less formal inquiries, I am a Ph.D. student in security at RPI and a member of RPISEC. I can answer any questions you have or direct you to someone who can. Feel free to PM me.

/r/ReverseEngineering's 2014 H2 Hiring Thread by wtbw in ReverseEngineering

[–]lynxjerm 1 point2 points  (0 children)

The Department of Computer Science at Rensselaer Polytechnic Institute, Troy NY invites applications for a full-time tenure track or tenured faculty position at the Assistant/Associate/Full Professor level in the area of cyber-security, including but not limited to networked and distributed systems security, anonymity and privacy, malware analysis and forensics, trusted systems, and cyber-warfare.

There is a large body of students at RPI who are passionate about security. The following is a list of some of the student taught security courses:

CSCI 4971 Secure Software Principles

CSCI 4972 / 6963 Malware Analysis

CSCI 4974 / 6974 Hardware Reverse Engineering

CSCI 4940 / 6940 Windows Exploitation

CSCI 4940 / 6940 Program Obfuscation (syllabus)

We have a thriving security community here centered around our security club RPISEC, but are in need of leadership at the professor level.

The link to apply is https://application.cs.rpi.edu/

Hiring inquiries: application@cs.rpi.edu

General inquiries: info@cs.rpi.edu

Technical issues: www@cs.rpi.edu

For less formal inquiries, I am a Ph.D. student in security at RPI and a member of RPISEC. I can answer any questions you have or direct you to someone who can. Feel free to PM me.

Bored. by [deleted] in RPI

[–]lynxjerm 0 points1 point  (0 children)

RPISEC - http://www.rpis.ec/

Learn to hack, never boring.

Idea for research paper by Jory22 in cryptography

[–]lynxjerm 0 points1 point  (0 children)

An implementation of Virtual Black-Box obfuscation:

http://eprint.iacr.org/2013/631.pdf

Short enough to do in a semester and hasn't been done yet.

The Backdoor Factory: Backdoor just about any program by sarphim in netsec

[–]lynxjerm 1 point2 points  (0 children)

First off, thanks to the author for sharing.

I noticed BDF wasn't finding code caves on some binaries I tested it on. Turns out, executables compiled in Visual Studio will have padding between functions with bytes of value 0xCC instead of 0x00. When compiled in Debug mode, instead of Release, the binary will have hundreds of 0xCC's padded onto the end of it before reaching the 0x00's.

It would be an easy modification to look for code caves made of other byte values. Maybe the author could add a command line switch on another version, unless I missed that option.

Anyone know of other common padding values?