segunda-feira, 31 de agosto de 2020

Introduction To Reversing Golang Binaries


Golang binaries are a bit hard to analyze but there are some tricks to locate the things and view what is doing the code.






Is possible to list all the go files compiled in the binary even in an striped binaries, in this case we have only one file gohello.go this is a good clue to guess what is doing the program.


On stripped binaries the runtime functions are not resolved so is more difficult to locate the user algorithms:


If we start from the entry point, we will found this mess:

The golang string initialization are encoded and is not displayed on the strings window.


How to locate main?  if its not stripped just bp on [package name].main for example bp main.main, (you can locate the package-name searching strings with ".main")


And here is our main.main:


The code is:

So in a stripped binary we cant find the string "hello world" neither the initialization 0x1337 nor the comparator 0x1337, all this is obfuscated.

The initialization sequence is:


The procedure for locating main.main in stripped binaries is:
1. Click on the entry point and locate the runtime.mainPC pointer:



2. click on runtime.main function (LAB_0042B030):


3. locate the main.main call after the zero ifs:



4. click on it and here is the main:




The runtime is not obvious for example the fmt.Scanf() call perform several internal calls until reach the syscall, and in a stripped binary there are no function names.



In order to identify the functions one option is compile another binary with symbols and make function fingerprinting.

In Ghidra we have the script golang_renamer.py which is very useful:


After applying this plugin the main looks like more clear:




This script is an example of function fingerprinting, in this case all the opcodes are included on the crc hashing:
# This script fingerprints the functions
#@author: sha0coder
#@category fingerprinting

print "Fingerprinting..."

import zlib


# loop through program functions
function = getFirstFunction()
while function is not None:
name = str(function.getName())
entry = function.getEntryPoint()
body = function.getBody()
addresses = body.getAddresses(True)

if not addresses.hasNext():
# empty function
continue

ins = getInstructionAt(body.getMinAddress())
opcodes = ''
while ins and ins.getMinAddress() <= body.getMaxAddress():
for b in ins.bytes:
opcodes += chr(b & 0xff)
ins = getInstructionAfter(ins)
crchash = zlib.crc32(opcodes) & 0xffffffff

print name, hex(crchash)


function = getFunctionAfter(function)





Related links


  1. Pentest Tools Download
  2. Pentest Tools Linux
  3. Nsa Hack Tools Download
  4. How To Install Pentest Tools In Ubuntu
  5. Hacking Tools 2020
  6. Bluetooth Hacking Tools Kali
  7. Pentest Tools Review
  8. Hacker Security Tools
  9. Hacker Search Tools
  10. Hacking Tools For Pc
  11. Hacking Apps
  12. Hack Tools For Windows
  13. Computer Hacker
  14. Hack Tools For Ubuntu
  15. Hacking Tools
  16. Hacker Tools List
  17. Hack Website Online Tool
  18. Blackhat Hacker Tools
  19. Wifi Hacker Tools For Windows
  20. Hackers Toolbox
  21. How To Make Hacking Tools
  22. Hack Tools 2019
  23. Hack Tools For Mac
  24. Hacking Tools Windows 10
  25. Hacks And Tools
  26. Hacking Tools For Windows 7
  27. Pentest Tools
  28. Blackhat Hacker Tools
  29. Hacker Tools 2020
  30. Pentest Tools Website Vulnerability
  31. Hacker Tools For Ios
  32. Hack Tools Github
  33. Hacker Tools Linux
  34. Hack Tools For Windows
  35. New Hack Tools
  36. Hacker Tools Free
  37. Ethical Hacker Tools
  38. Hack Tools 2019
  39. Hacking Tools And Software
  40. Pentest Reporting Tools
  41. Pentest Tools Review
  42. Free Pentest Tools For Windows
  43. Hacking Tools For Games
  44. Pentest Tools Website
  45. Hack App
  46. Hacker
  47. How To Hack
  48. Hacking Tools Windows
  49. New Hacker Tools
  50. Tools Used For Hacking
  51. Hacker Tools Mac
  52. Hacking Tools Hardware
  53. Hacker Tools 2020
  54. Pentest Tools
  55. Pentest Recon Tools
  56. Hack App
  57. Hacking Tools Download
  58. Pentest Tools For Ubuntu
  59. Top Pentest Tools
  60. Hacking Tools For Pc
  61. Hacking Tools For Mac
  62. Best Hacking Tools 2019
  63. Hack Tools For Ubuntu
  64. Hacker Tools List
  65. Hackers Toolbox
  66. Hacker Tools For Windows
  67. Hacker Security Tools
  68. Hacker Tools List
  69. Hacker Tools Software
  70. Bluetooth Hacking Tools Kali
  71. Hack Tools Download
  72. Hack App
  73. Hacking Tools
  74. Pentest Tools Android
  75. Hack Apps
  76. Hacking Tools For Windows 7
  77. Pentest Tools Github
  78. Hack App
  79. Kik Hack Tools
  80. Hacking Tools Usb
  81. Hacking Tools Software
  82. Pentest Tools Framework
  83. New Hack Tools
  84. Hack Tools For Mac
  85. Hacker Techniques Tools And Incident Handling
  86. Growth Hacker Tools
  87. Hacking Apps
  88. Hacking Tools Windows
  89. Pentest Recon Tools
  90. Hacker Tools 2020
  91. Best Hacking Tools 2019
  92. Install Pentest Tools Ubuntu
  93. Hacker Tools Online
  94. Hacker Tools Free Download
  95. Hack Tools
  96. Hack Tools For Pc
  97. Hacker Tools For Windows
  98. Hacking Tools For Kali Linux
  99. Hacker Tools For Pc
  100. Hacker Tool Kit
  101. Hacker Tools Linux
  102. Hacking Tools 2020
  103. Hacker Tools Free Download
  104. Physical Pentest Tools
  105. How To Hack
  106. Hacking Tools Name
  107. Hacking Apps
  108. Hak5 Tools
  109. Pentest Tools Download
  110. Game Hacking
  111. Pentest Tools Website
  112. Pentest Tools Windows
  113. Pentest Box Tools Download
  114. Hack Tools For Ubuntu
  115. Hacking Tools For Games
  116. Tools Used For Hacking
  117. Wifi Hacker Tools For Windows
  118. Hack Tools For Pc
  119. Pentest Tools Port Scanner
  120. Hacking Tools Windows 10
  121. Hacker Tools Online
  122. Pentest Tools Find Subdomains
  123. Hack Website Online Tool
  124. Hacking Tools Usb
  125. Hacker Tool Kit
  126. Hacker Search Tools

domingo, 30 de agosto de 2020

August Connector

OWASP
Connector
  August 2019

COMMUNICATIONS


Letter from the Vice-Chairman:

Dear OWASP Community,  

I hope you are enjoying your summer, mines been pretty busy, getting married, traveling to Vegas and the board elections. August has been quite a busy month for the foundation. Attending BlackHat and DefCon as part of our outreach program, the upcoming elections ( I have to add, there were some really good questions from the community) and planning for the next two Global AppSec Conferences in September, it's been crazy. We the board would like to thank the staff and without naming any names (Jon McCoy) for their efforts during BlackHat and DefCon. I was there, on the stand, he did a good job of representing our community.

Two days prior to BlackHat and Defcon the board met as part of our second face to face meeting of the year. This was two days well spent, collaborating on some of the burning topics, but also how to move forward. At the beginning of the year, we set out our strategic goals. Even though these goals are part of our everyday OWASP life we decided to put a name against them to champion them, below are our goals and who will be championing them going forward:

Marketing - Chenxi
Membership - Ofer
Developer Outreach - Martin
Project Focus - Sherif
Improve Finances - Gary
Perception - Martin 
Process Improvement - Owen
Consistent ED - Done! 
Community Empowerment - Richard

If you are interested in getting involved in or would like to hear more about any of these strategic goals, please reach out to the relevant name above. 

Some of the Global board members will be attending both our Global AppSec Conference in Amsterdam but also in DC. We will hold our next public board meeting during the Global AppSec Conference in Amsterdam if you haven't already done so I would encourage you to both attend and spread the word of the conference. There are some great keynotes/ speakers and trainers lined up. 

Regards
Owen Pendlebury 
Vice-Chairman of the OWASP Global Board of Directors
DC Registration Now Open                                   Amsterdam Registration Now Open
Congratulations to the Global AppSec Tel Aviv 2019
Capture the Flag Winners

 
For two full days, 24 competitors from around the world attacked various challenges that were present within the CTF activity held at Global AppSec Tel Aviv 2019. The competition began with a handful of competitors running neck and neck with two competitors, 4lemon and vasya, at the top, slowly gathering more points in their race hoping to win it all. At the last moment, they were overtaken by Aleph who swooped in and took away the victory for himself with a total score of 29 points! 

We would like to thank all of the individuals who participated and once again, congratulations to the top 3.
1st Place Winner: Aleph (29 points)
2nd Place: 4lemon (24 points)
3rd Place: vasya (24 points)

EVENTS 

You may also be interested in one of our other affiliated events:


REGIONAL EVENTS
Event DateLocation
OWASP Portland Training Day September 25, 2019 Portland, OR
OWASP Italy Day Udine 2019 September 27, 2019 Udine, Italy
OWASP Poland Day October 16,2019 Wroclaw, Poland
BASC 2019 (Boston Application Security Conference) October 19,2019 Burlington, MA
LASCON X October 24 - 25,2019 Austin, TX
OWASP AppSec Day 2019 Oct 30 - Nov 1, 2019 Melbourne, Australia
German OWASP Day 2019 December 9 - 10, 2019 Karlsruhe, Germany
AppSec California 2020 January 21 - 24. 2020 Santa Monica, CA
OWASP New Zealand Day 2020 February 20 - 21, 2020 Auckland, New Zealand

PARTNER AND PROMOTIONAL EVENTS
Event Date Location
it-sa-IT Security Expo and Congress October 8 - 10, 2019 Germany

PROJECTS


Project Review Results from Global AppSec - Tel Aviv 2019
The results of the project reviews from Global AppSec Tel Aviv 2019 are in!  The following projects have graduated to the indicated status:

Project Leaders Level
Mobile Security Testing Guide Jeroen Willemsen, Sven Schleier Flagship
Cheat Sheet Series Jim Manico, Dominique Righetto Flagship
Amass Jeff Foley Lab


Please congratulate the leaders and their teams for their achievements!
If your project was up for review at Global AppSec Tel Aviv 2019 and it is not on this list, it just means that the project did not yet receive enough reviews.  And, if you are interested in helping review projects, send me an email (harold.blankenship@owasp.com).

Project Showcases at the Upcoming Global AppSecs
The Project Showcases for Global Appsec DC 2019 and Global AppSec Amsterdam 2019 are finalized.  For a complete schedule, see the following links:

Global AppSec - DC 2019 Project Showcase
Global AppSec - Amsterdam 2019 Project Showcase


Google Summer of Code Update
Google Summer of Code is now in the final stages.  Final Evaluations are due by September 2nd.  


The Mentor Summit will be in Munich this year; congratulate the OWASP mentors who were picked by raffle to attend and represent OWASP: Azzeddine Ramrami & Ali Razmjoo.

Google Summer of Code Update

THE OWASP FOUNDATION HAS SELECTED THE TECHNICAL WRITER FOR GOOGLE SEASON OF DOCS by Fabio Cerullo

The OWASP Foundation has been accepted as the organization for the Google Seasons of Docs, a project whose goals are to give technical writers an opportunity to gain experience in contributing to open source projects and to give open-source projects an opportunity to engage the technical writing community.

During the program, technical writers spend a few months working closely with an open-source community. They bring their technical writing expertise to the project's documentation, and at the same time learn about open source and new technologies.

The open-source projects work with the technical writers to improve the project's documentation and processes. Together they may choose to build a new documentation set, or redesign the existing docs, or improve and document the open-source community's contribution procedures and onboarding experience. Together, we raise public awareness of open source docs, of technical writing, and of how we can work together to the benefit of the global open source community.

After a careful review and selection process, the OWASP Foundation has picked the primary technical writer who will work along the OWASP ZAP Team for the next 3 months to create the API documentation of this flagship project.

Congratulations to Nirojan Selvanathan!

Please refer to the linked document where you could look at the deliverables and work execution plan.
https://drive.google.com/open?id=1kwxAzaqSuvWhis9Xn1VKNJTJZPM2UV20

COMMUNITY

 
Welcome New OWASP Chapters

Tegucigalpa, Honduras
Johannesburg, South Africa
 

CORPORATE SPONSORS


 
Join us
Donate
Our mailing address is:
OWASP Foundation 
1200-C Agora Drive, #232
Bel Air, MD 21014  
Contact Us
Unsubscribe






This email was sent to *|EMAIL|*
why did I get this?    unsubscribe from this list    update subscription preferences
*|LIST:ADDRESSLINE|*