apt-get install wamerican-small, strip the vimcrypt header, convert it to a C array, and write a quick solver by using vim’s source code.
Assuming there’s more to whitespace than meets the eye, we search for all non-whitespace characters and remove them.
In .NET assemblies, String obfuscation is most often implemented by passing a series of nonsensical arguments to a deobfuscation method which then returns the deobfuscated string to a method. In this post, you will learn some quick and dirty methods of using reflection to automate string deobfuscation in .NET assemblies.
For two years now, Digital Operatives has hosted some systems on Verizon FiOS. Largely it has been trouble-free. That is, until about a week ago.
To help our fellow industry professionals and hackers alike, Digital Operatives has developed a suite of courses that can be taught at any location.
The 2013 CSAW Capture the Flag Qualification Round was held this past weekend with over 1300 participating teams. Like most Jeopardy-style CTFs, CSAW had several categories of problems, with Reverse Engineering as one of them. A small team from Digital Operatives participated in this competition; below are write-ups for the Reversing problems.
A small team from Digital Operatives participated in the CSAW CTF 2013 Qualification Round. Below is a writeup of one of the Crypto challenges.
Magiic allows for GPG indexing of IMAP on the command line. We are releasing the code using a version of the Creative Commons BY-NC-SA 3.0 license that has been modified slightly to be more applicable for software licensing.
Additional information about Landmine, our sophisticated custom defensive sensor that detects advanced targeted intrusions with ease.
Digital Operatives develops low-cost, high-payoff technologies that help to radically change the game. We like using creativity and innovation when advising clients because at the end of the day, thinking strategically in this age is the only way to be successful.