Please consider donating: https://www.corelan.be/index.php/donate/


8,336 views

Anti-debugging tricks revealed – Defcon CTF Qualifications 2009: Bin300 Analysis

Introduction

A while ago I stumbled upon an awesome write-up of a very nice CTF challenge created by sapheads:
http://hackerschool.org/DefconCTF/17/B300.html

I love cartoons, and I love reversing, so I decided to play a little bit with that binary (b300.exe) which was a lot of fun.

Because some interesting anti-debugging tricks were implemented into the binary, I decided to make a short video about the reversing process.

First of all, thanks to KorUPt and Sapheads (http://www.sapheads.org) for the awesome cartoon.
At the time of creating this video, the binary and KOrUPt’s write-up are available here:
http://www.rohitab.com/discuss/index.php?app=core&module=attach§ion=attach&attach_id=2736

Finally, thanks to Defcon and DDTek for this great challenge !

Enjoy!

 

Video

You can view a full screen version here

You can download the movie here


© 2011 – 2021, Corelan Team (fancy). All rights reserved.

3 Responses to Anti-debugging tricks revealed – Defcon CTF Qualifications 2009: Bin300 Analysis

Corelan Training

We have been teaching our win32 exploit dev classes at various security cons and private companies & organizations since 2011

Check out our schedules page here and sign up for one of our classes now!

Donate

Want to support the Corelan Team community ? Click here to go to our donations page.

Want to donate BTC to Corelan Team?



Your donation will help funding server hosting.

Corelan Team Merchandise

You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.

Protected by Copyscape Web Plagiarism Tool

Corelan on Slack

You can chat with us and our friends on our Slack workspace:

  • Go to our facebook page
  • Browse through the posts and find the invite to Slack
  • Use the invite to access our Slack workspace
  • Categories