Wavy

MediumMalware Reverse Engineering

Overview

Our forensics team has found a suspicious wav file, we need you to decode it.

Lab Details

Prerequisites & Requirements

  • Golang Binary Analysis: Understanding Go’s unique calling conventions, runtime metadata, and stripped function identification.
  • x64 Assembly: Proficiency in tracing floating-point operations (SSE/AVX instructions like mulsd, addsd) used for mathematical modeling.
  • Digital Audio Fundamentals: Basic knowledge of PCM (Pulse Code Modulation), sample rates (Hz), and sine wave generation (Amplitude/Phase/Frequency).

What will you learn?

  • Algorithmic Reversing: Deconstructing a mathematical "Black Box" inside a binary to determine how input data (ASCII) is transformed into an output signal.
  • DSP Forensics: Implementing Discrete Fourier Transform (DFT) or Fast Fourier Transform (FFT) to perform frequency-domain analysis on suspicious audio files.
  • Automated Data Recovery: Developing a Python-based decoder to programmatically reverse-engineer encoded signal segments into their original plaintext format.

Tools

  • Static Analysis: IDA Pro (for Go-specific disassembly and flow analysis).
  • Identification: Detect-It-Easy (DIE).

Job Positions

Security Analyst

Tags

Ida ProStatic AnalysisSteganographyDisassemblerMalware Analysis