We’ve received some feedback from our first reverse engineering challenge and realized it might be a little too complex and time consuming for beginners. We’ve decided to write a smaller, simpler one, this time targeting Windows. (Maybe that’s too much of a hint, already?) Download the file here.  Have fun with it; we purposefully wrote… » Read More»Read more

As the Dayton Daily News noted in an article from November, we are in the process of constructing our new facility.  The new facility will allow us to grow and employ more than double our current number of employees. We are happy to continue to be a part of the Springboro community. Below are some construction… » Read More»Read more

Every year Caesar Creek Software conducts a company-wide outing during the workday to get out and have a little fun.  For three out of the past four years the outing involves getting all employees out go-karting.  For some it is time away from the office to have a little fun and talk to their co-workers.  For… » Read More»Read more

  • Posted in Blog
  • Comments Off on Company Go Kart Outing

For this challenge, download the attached binary. First, figure out how to turn it into something you can analyze with a tool like IDA or a debugger. Next you need to figure out how to make the binary do something interesting. After that, you will need to set up the correct conditions to make the… » Read More»Read more

  • Posted in Blog
  • Comments Off on Reverse Engineering Challenge – 10/1/2015

Debuggers are usually helpful in dynamic analysis of software—that is, unless the software in question is malware. Your unfriendly neighborhood Trojan or worm hates debuggers. On the Windows platform, there exists a selection of debuggers with various levels of “anti-anti-debugger” capabilities. In the Linux/Unix world, where malware is becoming more common, we have little more… » Read More»Read more

  • Posted in Blog
  • Comments Off on linja: The Stealthy Linux Debugger