Christopher Roberts

Results 19 comments of Christopher Roberts

You'll need to modify three files: > inputDetector.py You'll need to add a detection strategy for identifying file open operations. Checking for "open" or "fopen" will probably cover most CTF...

It looks like it ran correctly. Did `Vulnerable_Pickle` get created? I should move the result dumping to it's own library and use that like that Discover and Dump does. It...

@Alien-AV I just updated the README and added some of the elastic search/kibana stuff. Check it out, it might be a better way to visualize some of the returned vulnerability...

05ea0514d7f870e350393afabee9cd4c4e518c7f - Part 1 Now I need to wrap the elastic search stuff better.

I totally missed you putting this up. It looks awesome!

I'll install it on a clean VM tonight and check it out. I thought I had segregated the radare2 and ghidra code. and at the top of Discover and Dump...

You're right! I had no idea this was a reverseable from root-me. I'll be on the hunt for a new binary that solves backwards.

I'm having trouble replicating this. Can you verify that inscount is getting made? That error you're getting is produced by the "read_count" function. So it's having trouble reading from that...

hmmm can you try `echo A | pin/pin -t obj-ia32/inscount0.so -- crypt4` and see if inscount gets created? Maybe pin didn't install right.

Sorry, would you try it with "examples/crypt4" not just "crypt4" it needs to be able to see the crypt4 example file