SlideShare a Scribd company logo
Nullcon
        JailBreak 2012
          Team Loosers

Ajith (r3dsm0k3)   Himanshu Das
Jailbreak Challenges
15 Challenges, 3 sections
       1.Exploitation
Jailbreak Challenges
15 Challenges, 3 sections
       2.Development
Jailbreak Challenges
15 Challenges, 3 sections
      3.Antivirus Bypass
Jailbreak Challenges
         15 Challenges, 3 sections
!   Exploitation



!   Development



!   Antivirus Bypass
PHP De-obfuscator
                   For http://fopo.com.ar

                           WHAT?

!   Used on free online PHP source obfuscator.

!   Impossible for naked eye to analyze the source.

!   Variables, functions are scrambled.

!   Uses base64 encoding, rot13 transformation etc. for
    obfuscation.
Fopo PHP Obfuscator
      Input/Output
Fopo PHP Obfuscator
     We were like..
WHY?
              Why did we choose this task.


!   No such de-obfuscators available.
!   Useful, can be used to analyze the malicious code, bug fixing
    etc.

!   Felt quite achievable within 36 hours.

!   And yes, for clearing CTFs like HackIM,ClubhackCTF etc.
    J
HOW?
                        Our Approach
                        1st Day in Jail.
!   Analyzed the obfuscated code.

!   Manually decoded the code (echo instead of eval + Burp for
    encoding/decoding + Find and Replace )

!   Started coding to convert the code line by line.
HOW?
                       1st Day in Jail.
                    Hacking our health.



!   100 Push-Ups




!   Several Sit-Ups, Duck-walk and many unknown exercises to
    man.
HOW?
             1st Day in Jail.
             End of 1st Day.




Line by line conversion found not feasible.
HOW?
1st Day in Jail.
End of 1st Day.




We Got Stuck..!!
HOW?
                       Our Approach
                      2nd Day in Jail.
!   Started analyzing the obfuscated code.
!   Found string patterns and the functions used to obfuscate.
!   Found the pattern to decode in an eval function
    gzinflate(base64_decode(str_rot13(“Obfuscated Code Goes
    Here”)));
!   Coding…
HOW?
                      Our Approach
                     2nd Day in Jail.
!   Coding done, Testing done..

!   Shown the code to Superintendent.

!   And…….
OUT OF JAIL..! :D

!   After hours of stress/lack of food, water/physical torture
    (yes, it was torture J ) we managed to get out of Jail as the
    first one to do so.

! Beeeeeeerrrrrrrr…..!! J
DEMO
This is how my script looks like
             now
          It Works.. J
Something awesome is cooking.

This is the future,well..I dream.. J
Future Development
!   Support for different levels of obfuscation.

!   Make the script command line.

!   Optimization of existing code to decrease the time,
    complexity, and make the algorithm more simple.
How JailBreak Benefited Us.
!   Time management (poo,pee,eat everything in 15 minutes).

!   Built muscles, Could go for Army Recruitment.

!   Better understanding of code obfuscation techniques.
Thank you all for bearing me. J

       Any Koschans..?

More Related Content

Viewers also liked

ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
Netcetera
 
Security testing
Security testingSecurity testing
Security testing
baskar p
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
Deepu S Nath
 

Viewers also liked (11)

Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016Security and Privacy on the Web in 2016
Security and Privacy on the Web in 2016
 
ONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web ApplicationsONE Conference: Vulnerabilities in Web Applications
ONE Conference: Vulnerabilities in Web Applications
 
Web Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security AwarenessWeb Vulnerabilities - Building Basic Security Awareness
Web Vulnerabilities - Building Basic Security Awareness
 
Introduction to Web security
Introduction to Web securityIntroduction to Web security
Introduction to Web security
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Security testing
Security testingSecurity testing
Security testing
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 

Similar to Nullcon Jailbreak CTF 2012,Walkthrough by Team Loosers

Agile latvia evening_unit_testing_in_practice
Agile latvia evening_unit_testing_in_practiceAgile latvia evening_unit_testing_in_practice
Agile latvia evening_unit_testing_in_practice
denis Udod
 
Scottish Ruby Conference 2014
Scottish Ruby Conference  2014Scottish Ruby Conference  2014
Scottish Ruby Conference 2014
michaelag1971
 
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|reBSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
Chandra Pratap
 

Similar to Nullcon Jailbreak CTF 2012,Walkthrough by Team Loosers (20)

Killer Bugs From Outer Space
Killer Bugs From Outer SpaceKiller Bugs From Outer Space
Killer Bugs From Outer Space
 
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with PythonSteelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Python
 
Spring, CDI, Jakarta EE good parts
Spring, CDI, Jakarta EE good partsSpring, CDI, Jakarta EE good parts
Spring, CDI, Jakarta EE good parts
 
Design and Evolution of cyber-dojo
Design and Evolution of cyber-dojoDesign and Evolution of cyber-dojo
Design and Evolution of cyber-dojo
 
Agile latvia evening_unit_testing_in_practice
Agile latvia evening_unit_testing_in_practiceAgile latvia evening_unit_testing_in_practice
Agile latvia evening_unit_testing_in_practice
 
Day1 - TDD (Lecture SS 2015)
Day1 - TDD (Lecture SS 2015)Day1 - TDD (Lecture SS 2015)
Day1 - TDD (Lecture SS 2015)
 
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortHacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
 
Scottish Ruby Conference 2014
Scottish Ruby Conference  2014Scottish Ruby Conference  2014
Scottish Ruby Conference 2014
 
Automatic detection of highlights from a Cricket Match
Automatic detection of highlights from a Cricket MatchAutomatic detection of highlights from a Cricket Match
Automatic detection of highlights from a Cricket Match
 
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorialYour money, your media a DRMtastic (reverse|re) eng. tutorial
Your money, your media a DRMtastic (reverse|re) eng. tutorial
 
Clean Code - The Next Chapter
Clean Code - The Next ChapterClean Code - The Next Chapter
Clean Code - The Next Chapter
 
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|reBSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
 
Organise a Code Dojo!
Organise a Code Dojo!Organise a Code Dojo!
Organise a Code Dojo!
 
[HITB Malaysia 2011] Exploit Automation
[HITB Malaysia 2011] Exploit Automation[HITB Malaysia 2011] Exploit Automation
[HITB Malaysia 2011] Exploit Automation
 
[Kiwicon 2011] Post Memory Corruption Memory Analysis
[Kiwicon 2011] Post Memory Corruption Memory Analysis[Kiwicon 2011] Post Memory Corruption Memory Analysis
[Kiwicon 2011] Post Memory Corruption Memory Analysis
 
Data Science Salon: Deep Learning as a Product @ Scribd
Data Science Salon: Deep Learning as a Product @ ScribdData Science Salon: Deep Learning as a Product @ Scribd
Data Science Salon: Deep Learning as a Product @ Scribd
 
teaching data science students to write clean code
teaching data science students to write clean codeteaching data science students to write clean code
teaching data science students to write clean code
 
Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...
Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...
Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...
 
Code Retreat
Code RetreatCode Retreat
Code Retreat
 
The London Python Code Dojo - An Education in Developer Education
The London Python Code Dojo - An Education in Developer EducationThe London Python Code Dojo - An Education in Developer Education
The London Python Code Dojo - An Education in Developer Education
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Nullcon Jailbreak CTF 2012,Walkthrough by Team Loosers

  • 1. Nullcon JailBreak 2012 Team Loosers Ajith (r3dsm0k3) Himanshu Das
  • 2. Jailbreak Challenges 15 Challenges, 3 sections 1.Exploitation
  • 3. Jailbreak Challenges 15 Challenges, 3 sections 2.Development
  • 4. Jailbreak Challenges 15 Challenges, 3 sections 3.Antivirus Bypass
  • 5. Jailbreak Challenges 15 Challenges, 3 sections !   Exploitation !   Development !   Antivirus Bypass
  • 6. PHP De-obfuscator For http://fopo.com.ar WHAT? !   Used on free online PHP source obfuscator. !   Impossible for naked eye to analyze the source. !   Variables, functions are scrambled. !   Uses base64 encoding, rot13 transformation etc. for obfuscation.
  • 7. Fopo PHP Obfuscator Input/Output
  • 8. Fopo PHP Obfuscator We were like..
  • 9. WHY? Why did we choose this task. !   No such de-obfuscators available. !   Useful, can be used to analyze the malicious code, bug fixing etc. !   Felt quite achievable within 36 hours. !   And yes, for clearing CTFs like HackIM,ClubhackCTF etc. J
  • 10. HOW? Our Approach 1st Day in Jail. !   Analyzed the obfuscated code. !   Manually decoded the code (echo instead of eval + Burp for encoding/decoding + Find and Replace ) !   Started coding to convert the code line by line.
  • 11. HOW? 1st Day in Jail. Hacking our health. !   100 Push-Ups !   Several Sit-Ups, Duck-walk and many unknown exercises to man.
  • 12. HOW? 1st Day in Jail. End of 1st Day. Line by line conversion found not feasible.
  • 13. HOW? 1st Day in Jail. End of 1st Day. We Got Stuck..!!
  • 14. HOW? Our Approach 2nd Day in Jail. !   Started analyzing the obfuscated code. !   Found string patterns and the functions used to obfuscate. !   Found the pattern to decode in an eval function gzinflate(base64_decode(str_rot13(“Obfuscated Code Goes Here”))); !   Coding…
  • 15. HOW? Our Approach 2nd Day in Jail. !   Coding done, Testing done.. !   Shown the code to Superintendent. !   And…….
  • 16. OUT OF JAIL..! :D !   After hours of stress/lack of food, water/physical torture (yes, it was torture J ) we managed to get out of Jail as the first one to do so. ! Beeeeeeerrrrrrrr…..!! J
  • 17. DEMO
  • 18. This is how my script looks like now It Works.. J
  • 19. Something awesome is cooking. This is the future,well..I dream.. J
  • 20. Future Development !   Support for different levels of obfuscation. !   Make the script command line. !   Optimization of existing code to decrease the time, complexity, and make the algorithm more simple.
  • 21. How JailBreak Benefited Us. !   Time management (poo,pee,eat everything in 15 minutes). !   Built muscles, Could go for Army Recruitment. !   Better understanding of code obfuscation techniques.
  • 22. Thank you all for bearing me. J Any Koschans..?