SlideShare a Scribd company logo
Nullcon
        JailBreak 2012
          Team Loosers

Ajith (r3dsm0k3)   Himanshu Das
Jailbreak Challenges
15 Challenges, 3 sections
       1.Exploitation
Jailbreak Challenges
15 Challenges, 3 sections
       2.Development
Jailbreak Challenges
15 Challenges, 3 sections
      3.Antivirus Bypass
Jailbreak Challenges
         15 Challenges, 3 sections
!   Exploitation



!   Development



!   Antivirus Bypass
PHP De-obfuscator
                   For http://fopo.com.ar

                           WHAT?

!   Used on free online PHP source obfuscator.

!   Impossible for naked eye to analyze the source.

!   Variables, functions are scrambled.

!   Uses base64 encoding, rot13 transformation etc. for
    obfuscation.
Fopo PHP Obfuscator
      Input/Output
Fopo PHP Obfuscator
     We were like..
WHY?
              Why did we choose this task.


!   No such de-obfuscators available.
!   Useful, can be used to analyze the malicious code, bug fixing
    etc.

!   Felt quite achievable within 36 hours.

!   And yes, for clearing CTFs like HackIM,ClubhackCTF etc.
    J
HOW?
                        Our Approach
                        1st Day in Jail.
!   Analyzed the obfuscated code.

!   Manually decoded the code (echo instead of eval + Burp for
    encoding/decoding + Find and Replace )

!   Started coding to convert the code line by line.
HOW?
                       1st Day in Jail.
                    Hacking our health.



!   100 Push-Ups




!   Several Sit-Ups, Duck-walk and many unknown exercises to
    man.
HOW?
             1st Day in Jail.
             End of 1st Day.




Line by line conversion found not feasible.
HOW?
1st Day in Jail.
End of 1st Day.




We Got Stuck..!!
HOW?
                       Our Approach
                      2nd Day in Jail.
!   Started analyzing the obfuscated code.
!   Found string patterns and the functions used to obfuscate.
!   Found the pattern to decode in an eval function
    gzinflate(base64_decode(str_rot13(“Obfuscated Code Goes
    Here”)));
!   Coding…
HOW?
                      Our Approach
                     2nd Day in Jail.
!   Coding done, Testing done..

!   Shown the code to Superintendent.

!   And…….
OUT OF JAIL..! :D

!   After hours of stress/lack of food, water/physical torture
    (yes, it was torture J ) we managed to get out of Jail as the
    first one to do so.

! Beeeeeeerrrrrrrr…..!! J
DEMO
This is how my script looks like
             now
          It Works.. J
Something awesome is cooking.

This is the future,well..I dream.. J
Future Development
!   Support for different levels of obfuscation.

!   Make the script command line.

!   Optimization of existing code to decrease the time,
    complexity, and make the algorithm more simple.
How JailBreak Benefited Us.
!   Time management (poo,pee,eat everything in 15 minutes).

!   Built muscles, Could go for Army Recruitment.

!   Better understanding of code obfuscation techniques.
Thank you all for bearing me. J

       Any Koschans..?

More Related Content

PPTX
Lightning Talk on WTF
PPTX
Chain rule & trigonometric functions
DOCX
Warm up1
ODP
Ardrone represent
PDF
Assignment 6
PDF
Assignment 6
PPT
APARATO REPRODUCTOR ANATOMIA
KEY
Asakusa ruby
Lightning Talk on WTF
Chain rule & trigonometric functions
Warm up1
Ardrone represent
Assignment 6
Assignment 6
APARATO REPRODUCTOR ANATOMIA
Asakusa ruby

Viewers also liked (11)

PDF
Security and Privacy on the Web in 2016
KEY
ONE Conference: Vulnerabilities in Web Applications
PPTX
Web Vulnerabilities - Building Basic Security Awareness
PPTX
Introduction to Web security
ODP
Top 10 Web Security Vulnerabilities
PDF
Web Security 101
PPT
Security testing
PDF
Web application security & Testing
PPTX
Web Security
PPTX
Web Security
PDF
Web Security - Introduction v.1.3
Security and Privacy on the Web in 2016
ONE Conference: Vulnerabilities in Web Applications
Web Vulnerabilities - Building Basic Security Awareness
Introduction to Web security
Top 10 Web Security Vulnerabilities
Web Security 101
Security testing
Web application security & Testing
Web Security
Web Security
Web Security - Introduction v.1.3
Ad

Similar to Nullcon Jailbreak CTF 2012,Walkthrough by Team Loosers (20)

PDF
Killer Bugs From Outer Space
PPTX
Steelcon 2014 - Process Injection with Python
PDF
Spring, CDI, Jakarta EE good parts
PDF
Design and Evolution of cyber-dojo
PPT
Agile latvia evening_unit_testing_in_practice
PDF
Day1 - TDD (Lecture SS 2015)
PDF
Hacking school computers for fun profit and better grades short
PDF
Scottish Ruby Conference 2014
PDF
Automatic detection of highlights from a Cricket Match
PDF
Your money, your media a DRMtastic (reverse|re) eng. tutorial
PPTX
Clean Code - The Next Chapter
PDF
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
PDF
Organise a Code Dojo!
PDF
[HITB Malaysia 2011] Exploit Automation
PDF
[Kiwicon 2011] Post Memory Corruption Memory Analysis
PPTX
Data Science Salon: Deep Learning as a Product @ Scribd
PPTX
teaching data science students to write clean code
PDF
Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...
PDF
Code Retreat
PDF
The London Python Code Dojo - An Education in Developer Education
Killer Bugs From Outer Space
Steelcon 2014 - Process Injection with Python
Spring, CDI, Jakarta EE good parts
Design and Evolution of cyber-dojo
Agile latvia evening_unit_testing_in_practice
Day1 - TDD (Lecture SS 2015)
Hacking school computers for fun profit and better grades short
Scottish Ruby Conference 2014
Automatic detection of highlights from a Cricket Match
Your money, your media a DRMtastic (reverse|re) eng. tutorial
Clean Code - The Next Chapter
BSidesLondon | Your Money, Your Media - A DRMtastic Android (reverse|re
Organise a Code Dojo!
[HITB Malaysia 2011] Exploit Automation
[Kiwicon 2011] Post Memory Corruption Memory Analysis
Data Science Salon: Deep Learning as a Product @ Scribd
teaching data science students to write clean code
Destruction, Decapods and Doughnuts: Continuous Delivery for Audio & Video Fa...
Code Retreat
The London Python Code Dojo - An Education in Developer Education
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx

Nullcon Jailbreak CTF 2012,Walkthrough by Team Loosers

  • 1. Nullcon JailBreak 2012 Team Loosers Ajith (r3dsm0k3) Himanshu Das
  • 2. Jailbreak Challenges 15 Challenges, 3 sections 1.Exploitation
  • 3. Jailbreak Challenges 15 Challenges, 3 sections 2.Development
  • 4. Jailbreak Challenges 15 Challenges, 3 sections 3.Antivirus Bypass
  • 5. Jailbreak Challenges 15 Challenges, 3 sections !   Exploitation !   Development !   Antivirus Bypass
  • 6. PHP De-obfuscator For http://fopo.com.ar WHAT? !   Used on free online PHP source obfuscator. !   Impossible for naked eye to analyze the source. !   Variables, functions are scrambled. !   Uses base64 encoding, rot13 transformation etc. for obfuscation.
  • 7. Fopo PHP Obfuscator Input/Output
  • 8. Fopo PHP Obfuscator We were like..
  • 9. WHY? Why did we choose this task. !   No such de-obfuscators available. !   Useful, can be used to analyze the malicious code, bug fixing etc. !   Felt quite achievable within 36 hours. !   And yes, for clearing CTFs like HackIM,ClubhackCTF etc. J
  • 10. HOW? Our Approach 1st Day in Jail. !   Analyzed the obfuscated code. !   Manually decoded the code (echo instead of eval + Burp for encoding/decoding + Find and Replace ) !   Started coding to convert the code line by line.
  • 11. HOW? 1st Day in Jail. Hacking our health. !   100 Push-Ups !   Several Sit-Ups, Duck-walk and many unknown exercises to man.
  • 12. HOW? 1st Day in Jail. End of 1st Day. Line by line conversion found not feasible.
  • 13. HOW? 1st Day in Jail. End of 1st Day. We Got Stuck..!!
  • 14. HOW? Our Approach 2nd Day in Jail. !   Started analyzing the obfuscated code. !   Found string patterns and the functions used to obfuscate. !   Found the pattern to decode in an eval function gzinflate(base64_decode(str_rot13(“Obfuscated Code Goes Here”))); !   Coding…
  • 15. HOW? Our Approach 2nd Day in Jail. !   Coding done, Testing done.. !   Shown the code to Superintendent. !   And…….
  • 16. OUT OF JAIL..! :D !   After hours of stress/lack of food, water/physical torture (yes, it was torture J ) we managed to get out of Jail as the first one to do so. ! Beeeeeeerrrrrrrr…..!! J
  • 17. DEMO
  • 18. This is how my script looks like now It Works.. J
  • 19. Something awesome is cooking. This is the future,well..I dream.. J
  • 20. Future Development !   Support for different levels of obfuscation. !   Make the script command line. !   Optimization of existing code to decrease the time, complexity, and make the algorithm more simple.
  • 21. How JailBreak Benefited Us. !   Time management (poo,pee,eat everything in 15 minutes). !   Built muscles, Could go for Army Recruitment. !   Better understanding of code obfuscation techniques.
  • 22. Thank you all for bearing me. J Any Koschans..?