Menu

OPOSEC [0x61]

March 25, 2017 - Hacking, Oposec, Security
OPOSEC [0x61]

 

On the 23rd of March took place another #OPOSEC meeting.

This was my second attendance and it was great, as i expected.

 

On the “[0x61] – The Meet” agenda, there were 2 topics to discuss:

Binary Reverse Engineering
Nagios

Unfortunatly a talk about RFID/NFC Cloning was cancelled and replaced by the Nagios talk, still, it was a great meeting.

Just like last meeting, we all gather and had some drinks, than the usual introduction of need members.

Than the real deal, Binary Reverse Engineering, this was a great presentation, we got to know how to dig into file’s code using some awesome tools, find interesting instructions and patch the file with some modifications so we could bypass validations, like on games that ask for a key to play.

Reverse Engineering can be very powerful, you can even study the code and build a Key Generator yourself.

Be aware though, those cracks you download for applications or games, made by Reverse Engineers, comes most of the time with all sort of malware, key-loggers and spying tools.

Unfortunately not everybody do it for fun.

After this talk we had the Nagios talk, this was not new to me, I’ve worked with Nagios for many years and still setup this tool for monitoring systems.

If you need a free solution to monitor server’s availability, services status and much more, Nagios is a must, very powerful.

Lately I’ve been using a similar tool called Zabbix, that I’ve talk about on this blog, it works pretty much the same way.

I’ll probably talk more about it on another blog entry.

Besides these talks, we had lots of beer and food, cool geek people to talk to and an overall cool environment.

Each #OPOSEC meeting comes with a challenge, and this challenge was awesome!
We had access to a tar file with the last meeting presentation files, the challenge was to find something “juicy” besides the clear files.

The solution was to reverse engineer the tar file, which contained a photo from last meeting hidden in the code.

That picture could then be hacked by changing RGB color order, exposing a plain text secret message. Cool!

Count me in for the next meeting!

Please follow and like me at:

Leave a Reply

Your email address will not be published. Required fields are marked *