malphx://blog

Aller au contenu | Aller au menu | Aller à la recherche

Mot clé - reverse engineering

Fil des billets - Fil des commentaires

vendredi, mai 14 2010

My submission to the Honeynet Project Forensic challenge 2010/3

The Honeynet Project's team has published the results for their last forensic challenge.

Congratulations to the Winners !

This time, luck was not with me and I was not in the top 3, but came only in 4th position.

Because only the winners submissions are published on the Challenges official site, I publish mine here for review and comments.

Unfortunately, I misunderstood question 5...

This challenge was really good and again taught me a lot of new things and new tools.

My official results:

For this 3rd challenge, we received a total of 22 submissions. With your score of 41, you came into position 4. You placed into the top third. With the many great submissions and the competitive field, this is a great accomplishment. Congratulations.

Below you will find your score per answer:
    Answer 1: 2 points
    Answer 2: 4 points
    Answer 3: 2 points
    Answer 4: 4 points
    Answer 5: 1 points
    Answer 6: 8 points
    Answer 7: 2 points
    Answer 8: 6 points
    Answer 9: 4 points
    Answer 10: 5 points
In addition, you have received 3 bonus points.

You could find my submission here: franck_dot_guenichot_at_orange_dot_fr_Forensic_Challenge_2010_-_Challenge_3.pdf

Feel free to leave a comment !

dimanche, novembre 25 2007

Crackme#4: le dernier pour l'instant

Voila le dernier crackme que j'ai écrit, il n'y a pas si longtemps...

Lire la suite...

Crackme#3

Et de 3...

Lire la suite...

Crackme#2 "Find my passw0rd"

Dans la série, "mes crackmes", voici le second.

Lire la suite...

Crackme#1

Voici mon premier crackme,un keygenme en réalité, il a été écrit en avril 2006, entièrement en assembleur, et reste relativement simple.

Lire la suite...