Wavy
MediumMalware Reverse Engineering
Overview
Our forensics team has found a suspicious wav file, we need you to decode it.
Lab Details
Prerequisites & Requirements
- Golang Binary Analysis: Understanding Go’s unique calling conventions, runtime metadata, and stripped function identification.
- x64 Assembly: Proficiency in tracing floating-point operations (SSE/AVX instructions like mulsd, addsd) used for mathematical modeling.
- Digital Audio Fundamentals: Basic knowledge of PCM (Pulse Code Modulation), sample rates (Hz), and sine wave generation (Amplitude/Phase/Frequency).
What will you learn?
- Algorithmic Reversing: Deconstructing a mathematical "Black Box" inside a binary to determine how input data (ASCII) is transformed into an output signal.
- DSP Forensics: Implementing Discrete Fourier Transform (DFT) or Fast Fourier Transform (FFT) to perform frequency-domain analysis on suspicious audio files.
- Automated Data Recovery: Developing a Python-based decoder to programmatically reverse-engineer encoded signal segments into their original plaintext format.
Tools
- Static Analysis: IDA Pro (for Go-specific disassembly and flow analysis).
- Identification: Detect-It-Easy (DIE).
Job Positions
Security Analyst
Tags
Ida ProStatic AnalysisSteganographyDisassemblerMalware Analysis