30
Sep
2012

CSAW 2012 – Trivia

There were 5 Trivia questions, each worth 100 points:

    What is the first step of owning a target?
    What is the name of the Google’s dynamic malware analysis tool for Android applications?
    What is the x86 opcode for and al, 0x24? Put your answer in the form 0xFFFF.
    Who was the first security researcher to publish the DEP bypass that utilized WriteProcessMemory()?
    What is the name of Microsoft’s sophisticated distributed fuzzing system that utilizes automated debugging, taint analysis, model building, and constaint solving?


What is the first step of owning a target?

KEY: Recon


What is the name of the Google’s dynamic malware analysis tool for Android applications?

Info: http://googlemobile.blogspot.nl/2012/02/android-and-security.html

KEY: Bouncer


What is the x86 opcode for and al, 0x24? Put your answer in the form 0xFFFF.

Info: http://ref.x86asm.net/coder32.html#x02

KEY: 0x2424


Who was the first security researcher to publish the DEP bypass that utilized WriteProcessMemory()?

Info: http://seclists.org/fulldisclosure/2010/Mar/att-553/Windows-DEP-WPM.txt

KEY: Spencer Pratt


What is the name of Microsoft’s sophisticated distributed fuzzing system that utilizes automated debugging, taint analysis, model building, and constaint solving?

Info: http://research.microsoft.com/en-us/um/people/pg/public_psfiles/SAGE-in-one-slide.pdf

KEY: SAGE

Comments are closed.