Explore a groundbreaking approach to reverse engineering in this 25-minute conference talk from Security BSides San Francisco. Delve into the Witchcraft Compiler Collection, which aims to undo the work of linkers and produce relocatable files instead of decompiling code. Learn about achieving universal code reuse through relinking, creating binary reflection, and adding scripting capabilities with JIT compilation for automated API prototyping and annotation. Discover how manipulating dynamic linker internals can solve complex tasks, such as calling specific functions within binaries without crafting valid inputs. Witness demonstrations of new exploits in real-life applications and unconventional techniques like converting PEs to ELFs, in-memory scripting of sshd, and extracting crypto routines without disassembly. Gain insights into the potential applications for vulnerability exploitation, functional testing, and static analysis validation, all implemented in the open-source Witchcraft Compiler Collection.
Witchcraft Compiler Collection - Towards Programs Self Awareness
Security BSides San Francisco via YouTube
Overview
Syllabus
BSidesSF 2017 - Witchcraft Compiler Collection : Towards programs self awareness (endrazine)
Taught by
Security BSides San Francisco