A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #6395  by Maxstar
 Wed May 18, 2011 12:38 pm
The program eset_reversing_challenge_1.exe was designed to test your skills in reverse engineering. The task is aimed at candidates for the position „Malware Researcher“. Adequate programming knowledge and reverse engineering (code disassembling) skills are necessary for a successful completion of the task.

Your goal is to perform an analysis of the code of this executable. The analysis of the code should produce information about the payload of the program, conditions necessary for the execution of certain actions, etc.

Don’t get discouraged, put off, nor fooled! The program code can contain hidden files and text strings, conditional tasks, anti-debugging techniques and so on. If you don’t manage to overcome all obstacles, don’t despair, but send in your partial solution. Don’t forget that it’s also necessary to describe the procedure of your analysis, as your way of thinking can tell us more about your abilities than the results themselves. Send your results, analyses or comments to: analyst@eset.sk

Good luck with your investigation! :-)

http://joineset.com/researcher.html
 #6424  by Xylitol
 Thu May 19, 2011 5:55 pm
In attach, ESET Ekoparty 2010 crackme (who is really easy) and ESET CONFidence 2010 crackme (who is really not easy :þ)

Image

picture of eset_reversing_challenge_1.exe:
Image

solving ESET Ekoparty & keygenning in ~7min30
http://youtu.be/Nddqv0lF1oY?hd=1
Attachments
(1015.34 KiB) Downloaded 45 times
(4.37 KiB) Downloaded 40 times