SlideShare a Scribd company logo
ANALYSIS OF
(UNKNOWN)
FILE FORMATS
22nd September 2011
Mario Suvajac
Hi, I’m
Mario Suvajac
@msuvajac
suvajac.org
reversinglabs.com
FILE
   FORMATS


http://www.tripleman.com/index.php?showimage=6
FILE FORMATS
• Structured information storage/carriers
  – Compressed
  – Encrypted
  – All of the above
CATEGORIZATION



http://www.flickr.com/photos/fotomele/1072932978
CATEGORIZATION
• Availability
  – Open
  – Proprietary
• Different for each information type or
  contained in generalized container format
• Executables, archives...
Resources


           Overlay*

 UPX       Overlay
 1.25         Data1.cab
                               Setup.ibt
                            LZsetup.ibt*.*
              Data1.hdr
             Engine32.cab
              Layout.bin
                             Engine32.cab
              Setup.exe      Engine32*.*
               Setup.ibt
Unpacked       Setup.ini
               Setup.inx       File N
  PE32
WHY IS ANALYSIS
   IMPORTANT?


http://www.flickr.com/photos/marodesu/5932256377
WHY IS ANALYSIS IMPORTANT?
• Writing unpackers & validators
  – Anti-virus protection
  – Computer forensics
  – General software development
  – ...
HOW TO
   DO IT?



http://www.flickr.com/photos/karenilagan/2163284814
HOW TO DO IT?
• Specifications
• Reverse Engineering
• Asking Please
http://www.flickr.com/photos/19666640@N00/2884433955
FILE FORMAT PATTERNS
• File header
  – Magic
  – Sizes
  – Offsets
  – Algorithm ids
  – Block descriptors
  – ...
• Data
ZIP FILE FORMAT
Reverse
   engineering


http://www.tripleman.com/index.php?showimage=520
BY Just Observing
• Experience based
• Hex editor
• Diffing’
BY Debugging
• Watching reads & further data manipulation
• Compression & encryption algorithms
  reversing
CODING TIPS



http://www.flickr.com/photos/the8rgrl/4642045
CODING TIPS
• Security risks
• Problems in practice
• corelib
THANKS,
QUESTIONS?!
Btw.
IS HIRING

More Related Content

PDF
Anatomy of File Analysis and Decomposition Engine
PPT
Digital detective game
PPT
Network forensics1
PPTX
Network forensics and investigating logs
PPTX
Network Forensics Intro
PPTX
Activity 6 home project - ppt presentation sample
PDF
Network Forensics
PPT
DETECTIVE ELEMENTS
Anatomy of File Analysis and Decomposition Engine
Digital detective game
Network forensics1
Network forensics and investigating logs
Network Forensics Intro
Activity 6 home project - ppt presentation sample
Network Forensics
DETECTIVE ELEMENTS

Similar to Analysis of (unknown) file formats (20)

PPT
Encryption
PPTX
Data Management Crash Course
PPTX
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
PPTX
Digital Preservation with Archivematica: An Introduction
PPT
File Carving
PPTX
EMBA - BlackHat Middle East and Africa 2024
PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PPTX
Practical Data Management - ACRL DCIG Webinar
PDF
Why btrfs is the Bread and Butter of Filesystems
PDF
LinuxCon_2013_NA_Eckermann_Filesystems_btrfs.pdf
PDF
Beginners guide on how to start exploring IoT 2nd session
PDF
Protecting confidential files using SE-Linux
PPTX
Android forensics an Custom Recovery Image
PPTX
Web security
PPTX
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
PDF
Metasploitation part-1 (murtuja)
PPT
Guide to computer forensics and investigation.ppt
PPT
data acquisition in computer forensics and
PDF
De-Anonymizing Live CDs through Physical Memory Analysis
PPTX
Keith Norbie Flash Storage decision methodology - mnvmug
Encryption
Data Management Crash Course
Yihan Lian & Zhibin Hu - Smarter Peach: Add Eyes to Peach Fuzzer [rooted2017]
Digital Preservation with Archivematica: An Introduction
File Carving
EMBA - BlackHat Middle East and Africa 2024
AntiForensics - Leveraging OS and File System Artifacts.pdf
Practical Data Management - ACRL DCIG Webinar
Why btrfs is the Bread and Butter of Filesystems
LinuxCon_2013_NA_Eckermann_Filesystems_btrfs.pdf
Beginners guide on how to start exploring IoT 2nd session
Protecting confidential files using SE-Linux
Android forensics an Custom Recovery Image
Web security
Do Something Now: Why Perfect is the Enemy of Good (Enough) in Digital Preser...
Metasploitation part-1 (murtuja)
Guide to computer forensics and investigation.ppt
data acquisition in computer forensics and
De-Anonymizing Live CDs through Physical Memory Analysis
Keith Norbie Flash Storage decision methodology - mnvmug
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
sap open course for s4hana steps from ECC to s4
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Assigned Numbers - 2025 - Bluetooth® Document
The Rise and Fall of 3GPP – Time for a Sabbatical?
sap open course for s4hana steps from ECC to s4
Ad

Analysis of (unknown) file formats