Ever wondered how new cracker attack tools or internet worms are analyzed? The results of a fascinating challenge posted earlier this month by the Honeynet Project will show how its done.
The goal of the Reverse Challenge was to analyze a real, out-in-the-wild attack tool uploaded to a cracked Honeynet Project system earlier this year (see project.honeynet.org/reverse). Its not known what this hostile binary does or how it operates.
Besides the normal challenges of disassembly, this code is already known to use stealth techniques to make reverse engineering difficult. For the start of one sleuths analysis effort, see lcamtuf.coredump.cx/fenris/reverse.txt.
The contest is a fun project and a great learning opportunity for those interested in disassembly and how cracker tools work.