Pixel (RGB) – game.rop.sh & I-SECURE CTF

Ref: https://twitter.com/sornram9254/status/770222358179278848

ไม่ใช่ Write-up ละเอียดๆเท่าไหร่นะครับ
เพราะผมเองก็เพิ่งเข้าใจเหมือนกัน
ตอนแรกก็งงว่าโจทย์อะไร มีแต่ตัวเลขเป็นหมื่นๆบรรทัด ถถถถ+

ต้นคลิปเกือบจะพูด game-rop-dot-org แล้ว ถถถ+

Images and Pixels
https://processing.org/tutorials/pixels/

Fanpage : http://fb.me/sornram9254Fan
Facebook : http://fb.me/sornram9254
https://blog.sornram9254.com

WinDBG – The Basics for Debugging Crash Dumps in Windows 10

1. download WinDBG and install “Debugging Tools for Windows” => http://www.microsoft.com/click/services/Redirect2.ashx?CR_EAC=300135395
2. run cmd as admin
3. cmd => cd \Program Files (x86)\Windows Kits\8.1\Debuggers\x64\
4. cmd => windbg.exe -IA

5. open WinDBG => Start > All Programs > Windows Kits > Debugging Tools for x64 > WinDBG (x64)
6. set symbol file path :: File => Symbol File Path
7. SRV*C:\SymCache*http://msdl.microsoft.com/download/symbols
8. File > Save WorkSpace

ที่เหลือไปตามต่อได้ใน http://www.tenforums.com/tutorials/5558-windbg-basics-debugging-crash-dumps-windows-10-a.html

Malware Analysis

Cheat Sheet for Analyzing Malicious Software
https://zeltser.com/reverse-malware-cheat-sheet/

5 Steps to Building a Malware Analysis Toolkit Using Free Tools
https://zeltser.com/build-malware-analysis-toolkit/

Several Posts on Malware Analysis Tools
https://zeltser.com/several-posts-on-malware-analysis-tools/

Tips on Malware Analysis from Jake Williams
https://zeltser.com/tips-on-malware-analysis-from-jake-williams/

How Malicious Code Can Run in Microsoft Office Documents
https://zeltser.com/malicious-code-inside-office-documents/

Free Automated Malware Analysis Sandboxes and Services
https://zeltser.com/automated-malware-analysis/

Malware Sample Sources for Researchers
https://zeltser.com/malware-sample-sources/

How Security Companies Assign Names to Malware Specimens
https://zeltser.com/malware-naming-approaches/

Extracting Malicious Flash Objects from PDFs Using SWF Mastah
https://zeltser.com/extracting-swf-from-pdf-using-swf-mastah/

How Antivirus Software Works: 4 Detection Techniques
https://zeltser.com/how-antivirus-software-works/

NetworkMiner for Analyzing Network Streams and Pcap Files
https://zeltser.com/networkminer-for-analyzing-network-traffic/

3 Free NirSoft Tools for Malware Analysis
https://zeltser.com/processactivitymonitor-and-regfromapp/

Process Monitor Filters for Malware Analysis and Forensics
https://zeltser.com/process-monitor-filters-for-malware-analysis/

How to Get into Digital Forensics or Security Incident Response
https://zeltser.com/how-do-get-into-forensics-or-incident-response/

Analyzing Suspicious PDF Files With PDF Stream Dumper
https://zeltser.com/pdf-stream-dumper-malicious-file-analysis/

Learning Malware Analysis Through Practice
https://zeltser.com/learning-malware-analysis-through-practice/

One-Click Windows Memory Acquisition with DumpIt
https://zeltser.com/memory-acquisition-with-dumpit-for-dfir-2/

Analyzing Suspicious PDF Files With Peepdf
https://zeltser.com/peepdf-malicious-pdf-analysis/

6 Free Local Tools for Analyzing Malicious PDF Files
https://zeltser.com/tools-for-malicious-pdf-analysis/

3 Tools to Scan the File System With Custom Malware Signatures
https://zeltser.com/custom-signatures-for-malware-scan/

Protect Files From Malware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-malware-protection-files/

Protect Processes from Spyware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-for-spyware-protection-processe/

Researching Malicious Websites: A Few Tips
https://zeltser.com/tips-for-researching-malicious-websites/

Introduction to Malware Analysis – Free Recorded Webcast
https://zeltser.com/malware-analysis-webcast/

Tips for Converting Shellcode to x86 Assembly
https://zeltser.com/convert-shellcode-to-assembly/

Analyzing Malicious Documents Cheat Sheet
https://zeltser.com/analyzing-malicious-documents/

Getting Started With Malware Analysis
https://zeltser.com/get-started-with-malware-analysis/

Mastering 4 Stages of Malware Analysis
https://zeltser.com/mastering-4-stages-of-malware-analysis/