Suche senden
Hochladen
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
•
Als PPTX, PDF herunterladen
•
1 gefällt mir
•
152,455 views
Source Conference
Folgen
Business
Technologie
Melden
Teilen
Melden
Teilen
1 von 43
Jetzt herunterladen
Empfohlen
Script
Script
David Evans
How To Open Source
How To Open Source
Lucas Lira Gomes
Hack Day EU 2011 YQL
Hack Day EU 2011 YQL
Jonathan LeBlanc
Hack with YUI
Hack with YUI
Luke Smith
Million Browser Botnet
Million Browser Botnet
Source Conference
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
Source Conference
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Korben00
Empfohlen
Script
Script
David Evans
How To Open Source
How To Open Source
Lucas Lira Gomes
Hack Day EU 2011 YQL
Hack Day EU 2011 YQL
Jonathan LeBlanc
Hack with YUI
Hack with YUI
Luke Smith
Million Browser Botnet
Million Browser Botnet
Source Conference
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
Source Conference
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Korben00
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Korben00
Conférence Net Neutrality
Conférence Net Neutrality
Korben00
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Expolink
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Учебный центр "Эшелон"
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
d_olex
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
d_olex
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Source Conference
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Vasilii Chernov
Double Dog Dare
Double Dog Dare
halffast
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
jet_information_security
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
ESUG
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
Ben Schmidtke III
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
Rakuten Group, Inc.
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Tobias Leisgang
Improving the Pharo VM
Improving the Pharo VM
FAST
Schizophrenic files
Schizophrenic files
Ange Albertini
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Area41
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
The Software House
What is (not) Pharo 8?
What is (not) Pharo 8?
FAST
Weitere ähnliche Inhalte
Andere mochten auch
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Korben00
Conférence Net Neutrality
Conférence Net Neutrality
Korben00
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Expolink
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Учебный центр "Эшелон"
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
d_olex
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
d_olex
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Source Conference
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Vasilii Chernov
Double Dog Dare
Double Dog Dare
halffast
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
jet_information_security
Andere mochten auch
(13)
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Conférence Net Neutrality
Conférence Net Neutrality
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Double Dog Dare
Double Dog Dare
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
iBanking - a botnet on Android
iBanking - a botnet on Android
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
Ähnlich wie Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
ESUG
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
Ben Schmidtke III
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
Rakuten Group, Inc.
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Tobias Leisgang
Improving the Pharo VM
Improving the Pharo VM
FAST
Schizophrenic files
Schizophrenic files
Ange Albertini
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Area41
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
The Software House
What is (not) Pharo 8?
What is (not) Pharo 8?
FAST
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developers
osullish
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
Kiran Jonnalagadda
Open source is for life, not just for Christmas
Open source is for life, not just for Christmas
Richard Lord
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
Shane Coughlan
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
Shane Coughlan
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Flink Taiwan User Group
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer
John Riviello
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
Luis Lopez
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
Kir Chou
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
Organization for the Promotion, Protection and Progress of Frogans Technology
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Basis Technology
Ähnlich wie Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
(20)
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Improving the Pharo VM
Improving the Pharo VM
Schizophrenic files
Schizophrenic files
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
What is (not) Pharo 8?
What is (not) Pharo 8?
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developers
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
Open source is for life, not just for Christmas
Open source is for life, not just for Christmas
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Mehr von Source Conference
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
How to Like Social Media Network Security
How to Like Social Media Network Security
Source Conference
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Source Conference
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Source Conference
Esteganografia
Esteganografia
Source Conference
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Source Conference
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Source Conference
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
Who should the security team hire next?
Who should the security team hire next?
Source Conference
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
Source Conference
JSF Security
JSF Security
Source Conference
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Source Conference
Keynote
Keynote
Source Conference
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Source Conference
Mehr von Source Conference
(20)
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
How to Like Social Media Network Security
How to Like Social Media Network Security
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Esteganografia
Esteganografia
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Who should the security team hire next?
Who should the security team hire next?
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
JSF Security
JSF Security
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Keynote
Keynote
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Kürzlich hochgeladen
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
dollysharma2066
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
mbikashkanyari
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
Olivia Kresic
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
Seta Wicaksana
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
richard876048
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
callgirls2057
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
Chandresh Chudasama
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
ictsugar
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
ashishs7044
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
Seta Wicaksana
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Shashank Mehta
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Doge Mining Website
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
ictsugar
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Stunning ➥8448380779▻ Call Girls In Hauz Khas Delhi NCR
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
Rbc Rbcua
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy Verified Accounts
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
Americas Got Grants
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
Mintel Group
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
ashishs7044
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
NhtLNguyn9
Kürzlich hochgeladen
(20)
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
1.
Reverse-Engineering Flash Files
with SWFRETools Sebastian Porst (sp@porst.tv) – SOURCE Boston 2011
2.
About Me 2
3.
Current Work 3
4.
What this talk
is about Ship it! 4
5.
What this talk
is not about 5
6.
Why is this
relevant? 6
7.
SWF Files: An
Overview Header Tag 1 Tag 2 Tag 3 Tag 4 … Tag n 7
8.
SWF Files: Interesting
Aspects 8
9.
Existing Tools SWFTools
Flash Dump Decompiler swfmill Sothink SWF Decompiler 9
10.
Problems with existing
tools SWFTools Flash Dump Decompiler Crashes Old Limited Wrong tool swfmill Sothink SWF Decompiler 10
11.
Introducing SWFRETools 11
12.
Goals 12
13.
Architecture 13
14.
Tool I: The
Parser 14
15.
Parser Goals 15
16.
Workflow Intermezzo I
16
17.
Tool 2: Flash
Dissector 17
18.
Flash Dissector Goals
18
19.
Flash Dissector Demo
19
20.
Weaknesses of Flash
Dissector 20
21.
Flash Dissector Future
21
22.
Workflow Intermezzo II
22
23.
Static analysis vs
Dynamic analysis 23
24.
Detour: Flash Player
Debugger 24
25.
Detour: Flash Player
Debugger 25
26.
Tool III:
Tracer/Debugger 26
27.
Tracer Implementation 27
28.
Last week in
China 28
29.
Last week in
China 29
30.
Tracer Plans 30
31.
Workflow Intermezzo III
31
32.
Minimizing sample files
32
33.
Minimizing files without
templates 33
34.
Do not forget
RETURN 34 Function A Function B Crash here
35.
Tool IV: Minimizer
35
36.
Automated minimizing 36
37.
Minimizer Goals 37
38.
Off to GitHub
we go! Shipped! https://github.com/sporst 38
39.
Call for participation
39
40.
Summary 40
41.
Thank you! 41
?
42.
Let me help
… 42
43.
Image Credits http://www.flickr.com/photos/markchadwick/4592186576/
43
Hinweis der Redaktion
http://www.flickr.com/photos/markchadwick/4592186576/
http://www.flickr.com/photos/markchadwick/4592186576/
Jetzt herunterladen