Blog.

Articles on reverse engineering, malware analysis, CTF writeups, and cybersecurity tools by Itay Cohen.

Jul 4, 2020

Mapping the connections inside Russia’s APT Ecosystem

Research mapping the connections between Russian APT groups including Turla, Sofacy, and APT29. Analysis of shared code, infrastructure, and organizational ties.

Jul 4, 2020

Deobfuscating APT32 Flow Graphs with Cutter and Radare2

Deobfuscating APT32 (Ocean Lotus) control flow graphs using Cutter and radare2. Techniques for removing junk code and simplifying obfuscated binaries.

Jul 4, 2020

The Evolution of BackSwap

Analysis of the BackSwap banking trojan and its innovative techniques for stealing money through browser manipulation while evading detection.

Mar 15, 2020

CONFidence Teaser CTF – Hidden Flag

Using YARA rules to leak file contents from restricted environments. A technique for extracting data from systems where file scanning is allowed but downloading is blocked.

Dec 23, 2019

5 Ways to patch binaries with Cutter

Five methods for patching binaries using Cutter: NOP instructions, reversing jumps, editing assembly, writing bytes, and applying patches from the hex editor.

Jun 18, 2018

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2

Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.

May 21, 2018

‘Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1’

Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.

Jan 27, 2018

Solving PwCTF Prequel

Jan 14, 2018

Reversing a Self-Modifying Binary with radare2

Analyzing a packed, self-modifying binary with radare2. Covers UPX-like packers, runtime unpacking, ESIL emulation, and debugging packed executables.

Oct 9, 2017

Reverse engineering a Gameboy ROM with radare2

Reverse engineering a Gameboy ROM using radare2. Analyzing the Z80 architecture, Game Boy memory map, and solving a CTF challenge with r2.

Sep 2, 2017

A journey into Radare 2 – Part 2: Exploitation

Part 2 of the radare2 tutorial series. Covers exploitation, buffer overflows, ROP chains, and writing exploits with radare2.

Mar 27, 2017

A journey into Radare 2 – Part 1: Simple crackme

Step-by-step tutorial for learning radare2 by solving a simple crackme. Covers installation, basic commands, visual mode, analysis, and debugging.

Mar 5, 2017

[Pragyan CTF] New Avenger

Mar 5, 2017

[Pragyan CTF] Roller Coaster Ride

Mar 5, 2017

[Pragyan CTF] Lost Friends

Mar 5, 2017

[Pragyan CTF] The Vault

Mar 5, 2017

[Pragyan CTF] The Karaboudjan

Mar 5, 2017

[Pragyan CTF] Evil Corp

Mar 5, 2017

[Pragyan CTF] Supreme Leader

Mar 5, 2017

[Pragyan CTF] Answer To Everything

Mar 5, 2017

[Pragyan CTF] Interstellar

Mar 5, 2017

[Pragyan CTF] Game of Fame

Dec 29, 2016

[33C3 CTF] pay2win Writeup

Dec 29, 2016

[33C3 CTF] The 0x90s called Writeup

Oct 12, 2016

Fantastic Malware and Where to Find Them

Curated list of malware sample repositories, databases, and collections for malware analysts and security researchers.

Oct 3, 2016

[H4CK1T 2016] Crypt00perator – Ethiopia Writeup

Oct 3, 2016

[H4CK1T 2016] QRb00k – Russia Writeup

Oct 3, 2016

[H4CK1T 2016] ch17ch47 – Germany Writeup

Oct 3, 2016

[H4CK1T 2016] 1magePr1son- Mozambique Writeup

Oct 2, 2016

[H4CK1T 2016] v01c3_0f_7h3_fu7ur3 – Australia Writeup

Oct 2, 2016

[H4CK1T 2016] Belarus – Electronicon Writeup

Oct 2, 2016

[H4CK1T 2016] 1n51d3r’5 j0b – Canada Writeup

Oct 2, 2016

[H4CK1T 2016] HellMath – Mongolia Writeup

Oct 2, 2016

[H4CK1T 2016] Pentest – Mexico Writeup

Oct 2, 2016

[H4CK1T 2016] PhParanoid – Malaysia Writeup

Oct 2, 2016

[H4CK1T 2016] Hex0gator – Paraguay Writeup

Oct 2, 2016

[H4CK1T 2016] T3legr4m – United States Writeup

Sep 18, 2016

[CSAW 2016] Gametime Writeup

Sep 18, 2016

[CSAW 2016] Key Writeup

Sep 18, 2016

[CSAW 2016] Sleeping Guard Writeup

Sep 18, 2016

[CSAW 2016] mfw Writeup

Sep 18, 2016

[CSAW 2016] PWN: Warmup Writeup

Sep 18, 2016

[CSAW 2016] Clams Don’t Dance Writeup

Sep 18, 2016

[CSAW 2016] Regexpire Writeup

Sep 18, 2016

[CSAW 2016] Coinslot Writeup

Sep 18, 2016

[CSAW 2016] Kill Writeup

Sep 11, 2016

[ASIS CTF] SecuPrim Writeup

Sep 11, 2016

[ASIS CTF] Sky Blue Writeup

Sep 11, 2016

[ASIS CTF] Smallest MD5 Writeup

Sep 11, 2016

[ASIS CTF] CTF 101 Writeup

Sep 5, 2016

[TWCTF-2016: Web] Global Page Writeup

Sep 5, 2016

[TWCTF-2016: Crypto] Twin Primes Writeup

Sep 5, 2016

[TWCTF-2016: PPC] Make a Palindrome! Writeup

Sep 5, 2016

[TWCTF-2016: Misc] glance Writeup

Sep 5, 2016

[TWCTF-2016: Web] Rescue Data 1: deadnas Writeup

Sep 4, 2016

[TWCTF-2016: Reverse] Reverse Box Writeup

Sep 4, 2016

[TWCTF-2016: PWN] judgement Writeup

Aug 28, 2016

[CTF(x) 2016 : WEB] Harambehub – 100 pts Writeup

Aug 28, 2016

[CTF(x) 2016 : WEB] north korea – 50 pts Writeup

Nov 27, 2015

XOR Files With Python

Python script that XORs two files together. Useful for RAID 5 data recovery, binary deobfuscation, and forensic analysis.

Nov 2, 2015

XOR Files With Powershell

PowerShell script that XORs two files together. Useful for RAID 5 data recovery, binary deobfuscation, and forensic analysis.

Apr 2, 2015

Private: [Root-Me] Javascript – Authentication Writeup