Skip to main content

2 posts tagged with "reverse-engineering"

View All Tags

pwndocker-reverse: One Docker Image for CTF Pwn and Reverse Engineering

· 4 min read
gl0bal01
Researcher

CTF weekend. My teammate can't run my exploit because their Ubuntu isn't my Ubuntu. Different Python version, different libc, different vibes. The tool that works on my machine installs cleanly on mine and fails silently on theirs. We burn 40 minutes on environment debugging instead of the actual challenge.

The "works on my machine" problem, but for offsec tooling. The fix is obvious in hindsight: package everything into one image so the next teammate just does docker pull.

pwndocker-reverse is that image — 45+ tools on Ubuntu 24.04, everything from pwntools to Ghidra to AFL++ to three GDB plugins that coexist without breaking each other. One pull, you're in.

Volatility Toolkit v2: Automated Memory Forensics for Windows, Linux, and macOS

· 4 min read
gl0bal01
Researcher

Forensics challenge, 90-minute timer. I spent 60 of those minutes running vol -f memory.raw <plugin> in sequence, one plugin at a time, piping output to files, checking for errors, moving to the next. Mechanical, repetitive work. And at the end of it I had 25 output files to correlate — and I'd never gotten to malfind. The artifact was in there. I missed it because I ran out of time doing the wrong kind of thinking.

That's the problem: Volatility 3 is powerful, but the interface is 20+ manual commands on every single case. Volatility Toolkit automates the sequence. Auto-detect the OS, run all relevant plugins in parallel, extract IOCs, structured report. One command. Then you think about what the dump shows, not which command to type next.