Geekspeak: July 15, 2002

By Timothy Dyck  |  Posted 2008-01-17 Print this article Print

Contest highlights disassembly experts in action.

Ever wondered how new cracker attack tools or internet worms are analyzed? The results of a fascinating challenge posted earlier this month by the Honeynet Project will show how its done.

The goal of the Reverse Challenge was to analyze a real, out-in-the-wild attack tool uploaded to a cracked Honeynet Project system earlier this year (see Its not known what this hostile binary does or how it operates.

Besides the normal challenges of disassembly, this code is already known to use stealth techniques to make reverse engineering difficult. For the start of one sleuths analysis effort, see

The contest is a fun project and a great learning opportunity for those interested in disassembly and how cracker tools work.

Timothy Dyck is a Senior Analyst with eWEEK Labs. He has been testing and reviewing application server, database and middleware products and technologies for eWEEK since 1996. Prior to joining eWEEK, he worked at the LAN and WAN network operations center for a large telecommunications firm, in operating systems and development tools technical marketing for a large software company and in the IT department at a government agency. He has an honors bachelors degree of mathematics in computer science from the University of Waterloo in Waterloo, Ontario, Canada, and a masters of arts degree in journalism from the University of Western Ontario in London, Ontario, Canada.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel