Enviar búsqueda
Cargar
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
•
Descargar como PPTX, PDF
•
1 recomendación
•
152,455 vistas
Source Conference
Seguir
Empresariales
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 43
Descargar ahora
Recomendados
Script
Script
David Evans
How To Open Source
How To Open Source
Lucas Lira Gomes
Hack Day EU 2011 YQL
Hack Day EU 2011 YQL
Jonathan LeBlanc
Hack with YUI
Hack with YUI
Luke Smith
Million Browser Botnet
Million Browser Botnet
Source Conference
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
Source Conference
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Korben00
Recomendados
Script
Script
David Evans
How To Open Source
How To Open Source
Lucas Lira Gomes
Hack Day EU 2011 YQL
Hack Day EU 2011 YQL
Jonathan LeBlanc
Hack with YUI
Hack with YUI
Luke Smith
Million Browser Botnet
Million Browser Botnet
Source Conference
Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBee
Source Conference
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet Blacklists
Source Conference
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Korben00
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Korben00
Conférence Net Neutrality
Conférence Net Neutrality
Korben00
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Expolink
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Учебный центр "Эшелон"
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
d_olex
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
d_olex
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Source Conference
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Vasilii Chernov
Double Dog Dare
Double Dog Dare
halffast
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
jet_information_security
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
ESUG
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
Ben Schmidtke III
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
Rakuten Group, Inc.
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Tobias Leisgang
Improving the Pharo VM
Improving the Pharo VM
FAST
Schizophrenic files
Schizophrenic files
Ange Albertini
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Area41
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
The Software House
What is (not) Pharo 8?
What is (not) Pharo 8?
FAST
Más contenido relacionado
Destacado
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Korben00
Conférence Net Neutrality
Conférence Net Neutrality
Korben00
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Expolink
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Учебный центр "Эшелон"
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
d_olex
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
d_olex
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Source Conference
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Vasilii Chernov
Double Dog Dare
Double Dog Dare
halffast
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
Source Conference
iBanking - a botnet on Android
iBanking - a botnet on Android
Source Conference
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
jet_information_security
Destacado
(13)
YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
Conférence Net Neutrality
Conférence Net Neutrality
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
Double Dog Dare
Double Dog Dare
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
iBanking - a botnet on Android
iBanking - a botnet on Android
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
Similar a Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
ESUG
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
Ben Schmidtke III
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
Rakuten Group, Inc.
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Tobias Leisgang
Improving the Pharo VM
Improving the Pharo VM
FAST
Schizophrenic files
Schizophrenic files
Ange Albertini
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Area41
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
The Software House
What is (not) Pharo 8?
What is (not) Pharo 8?
FAST
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developers
osullish
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
Kiran Jonnalagadda
Open source is for life, not just for Christmas
Open source is for life, not just for Christmas
Richard Lord
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
Shane Coughlan
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
Shane Coughlan
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Flink Taiwan User Group
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer
John Riviello
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
Luis Lopez
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
Kir Chou
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
Organization for the Promotion, Protection and Progress of Frogans Technology
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Basis Technology
Similar a Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
(20)
Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
Improving the Pharo VM
Improving the Pharo VM
Schizophrenic files
Schizophrenic files
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
What is (not) Pharo 8?
What is (not) Pharo 8?
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developers
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
Open source is for life, not just for Christmas
Open source is for life, not just for Christmas
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Más de Source Conference
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Source Conference
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
Source Conference
How to Like Social Media Network Security
How to Like Social Media Network Security
Source Conference
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Source Conference
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Source Conference
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Source Conference
Esteganografia
Esteganografia
Source Conference
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Source Conference
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Source Conference
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Source Conference
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Source Conference
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Source Conference
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Source Conference
Who should the security team hire next?
Who should the security team hire next?
Source Conference
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
Source Conference
JSF Security
JSF Security
Source Conference
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Source Conference
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Source Conference
Keynote
Keynote
Source Conference
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Source Conference
Más de Source Conference
(20)
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
How to Like Social Media Network Security
How to Like Social Media Network Security
Wfuzz para Penetration Testers
Wfuzz para Penetration Testers
Security Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
Securty Testing For RESTful Applications
Securty Testing For RESTful Applications
Esteganografia
Esteganografia
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
Adapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
Advanced (persistent) binary planting
Advanced (persistent) binary planting
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Who should the security team hire next?
Who should the security team hire next?
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
JSF Security
JSF Security
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
Keynote
Keynote
Threat Modeling: Best Practices
Threat Modeling: Best Practices
Último
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Bhavana Pujan Kendra
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
elgieurope
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
Hector Del Castillo, CPM, CPMM
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
ASGITConsulting
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
NZSG
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
Adnet Communications
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
elijahj01012
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
HajeJanKamps
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
mbikashkanyari
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
Aggregage
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
ssuserf63bd7
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
Chris Skinner
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Shaun Heinrichs
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Shaun Heinrichs
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
Doe Paoro
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
Danny Diep To
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Aggregage
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
Peter Horsten
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
JamesConcepcion7
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Shashank Mehta
Último
(20)
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools
1.
Reverse-Engineering Flash Files
with SWFRETools Sebastian Porst (sp@porst.tv) – SOURCE Boston 2011
2.
About Me 2
3.
Current Work 3
4.
What this talk
is about Ship it! 4
5.
What this talk
is not about 5
6.
Why is this
relevant? 6
7.
SWF Files: An
Overview Header Tag 1 Tag 2 Tag 3 Tag 4 … Tag n 7
8.
SWF Files: Interesting
Aspects 8
9.
Existing Tools SWFTools
Flash Dump Decompiler swfmill Sothink SWF Decompiler 9
10.
Problems with existing
tools SWFTools Flash Dump Decompiler Crashes Old Limited Wrong tool swfmill Sothink SWF Decompiler 10
11.
Introducing SWFRETools 11
12.
Goals 12
13.
Architecture 13
14.
Tool I: The
Parser 14
15.
Parser Goals 15
16.
Workflow Intermezzo I
16
17.
Tool 2: Flash
Dissector 17
18.
Flash Dissector Goals
18
19.
Flash Dissector Demo
19
20.
Weaknesses of Flash
Dissector 20
21.
Flash Dissector Future
21
22.
Workflow Intermezzo II
22
23.
Static analysis vs
Dynamic analysis 23
24.
Detour: Flash Player
Debugger 24
25.
Detour: Flash Player
Debugger 25
26.
Tool III:
Tracer/Debugger 26
27.
Tracer Implementation 27
28.
Last week in
China 28
29.
Last week in
China 29
30.
Tracer Plans 30
31.
Workflow Intermezzo III
31
32.
Minimizing sample files
32
33.
Minimizing files without
templates 33
34.
Do not forget
RETURN 34 Function A Function B Crash here
35.
Tool IV: Minimizer
35
36.
Automated minimizing 36
37.
Minimizer Goals 37
38.
Off to GitHub
we go! Shipped! https://github.com/sporst 38
39.
Call for participation
39
40.
Summary 40
41.
Thank you! 41
?
42.
Let me help
… 42
43.
Image Credits http://www.flickr.com/photos/markchadwick/4592186576/
43
Notas del editor
http://www.flickr.com/photos/markchadwick/4592186576/
http://www.flickr.com/photos/markchadwick/4592186576/
Descargar ahora