{"id":1582,"date":"2019-09-18T16:59:10","date_gmt":"2019-09-18T14:59:10","guid":{"rendered":"http:\/\/hacktivity.com\/?p=1582"},"modified":"2019-09-19T09:57:34","modified_gmt":"2019-09-19T07:57:34","slug":"shelob-streams-endlessly-logic-bugs","status":"publish","type":"post","link":"https:\/\/2022.hacktivity.com\/index.php\/shelob-streams-endlessly-logic-bugs\/","title":{"rendered":"S(H)ELOB – Streams Endlessly Logic Bugs"},"content":{"rendered":"
\n

We have developed a system that discovers 0day vulnerabilities automatically.<\/span><\/p>\n<\/div>\n

The preparation for the upcoming Hactivity conference<\/span> [25-26<\/span> October 2019] goes really well.\u00a0<\/span>This week we also launched the mass production of our new electronic hardware-hacking badge that is going to be handed over to our ticket buyers. These are the things you might already know, but here’s a new announcement which is for sure new and exciting for you.<\/span><\/div>\n
<\/div>\n

<\/p>\n

<\/div>\n
In the background, The Hacktivity Team have created a new department called <\/span>Hacktivity Labs<\/b><\/span>. \\o\/<\/span><\/div>\n
<\/div>\n
What is this about? In general, Hacktivity Labs will focus on reverse engineering all kinds of techniques to discover software & hardware vulnerabilities.<\/span> [This<\/span> department is responsible for the production and development of the hardware-hacking badge as well.]<\/span><\/div>\n
<\/div>\n
\n

Finding bugs automatically<\/span><\/h2>\n<\/div>\n
If you have ever searched for software or any kind of bugs you may know that after being happy about it, the next thought is that: OK, how can I find a lot more of this? So the first project of Hacktivity Labs was to develop a tool that can automatically find software vulnerabilities efficiently on Windows operating system.\u00a0<\/span><\/div>\n
<\/div>\n

\nThe leader of this project is Attila Marosi-Bauer. In his free time, he likes to dive deep in the process of reverse engineering to get a better understanding of how these products are operating, and more importantly to find the vulnerabilities and weaknesses of these kinds of software.<\/span><\/div>\n
<\/div>\n

\nOk, we recognized that we have the obsession to find software bugs on Windows systems. One of the easiest test cases is to run the tested application while Sysinternals ProcMon or any kind of system monitoring service running to collect information about the discussion of the application and the Operation System. <\/span>After harvesting enough behavior information, the one that can query well may find software vulnerabilities.<\/b><\/span><\/div>\n
<\/div>\n
For example:<\/b><\/span><\/span><\/div>\n