Author Archive

We’ve received some feedback from our first reverse engineering challenge and realized it might be a little too complex and time consuming for beginners. We’ve decided to write a smaller, simpler one, this time targeting Windows. (Maybe that’s too much of a hint, already?) Download the file here.  Have fun with it; we purposefully wrote… » Read More

As the Dayton Daily News noted in an article from November, we are in the process of constructing our new facility.  The new facility will allow us to grow and employ more than double our current number of employees. We are happy to continue to be a part of the Springboro community. Below are some construction… » Read More

Every year Caesar Creek Software conducts a company-wide outing during the workday to get out and have a little fun.  For three out of the past four years the outing involves getting all employees out go-karting.  For some it is time away from the office to have a little fun and talk to their co-workers.  For… » Read More

  • Posted in Blog
  • Comments Off on Company Go Kart Outing

For this challenge, download the attached binary. First, figure out how to turn it into something you can analyze with a tool like IDA or a debugger. Next you need to figure out how to make the binary do something interesting. After that, you will need to set up the correct conditions to make the… » Read More

  • Posted in Blog
  • Comments Off on Reverse Engineering Challenge – 10/1/2015

Caesar Creek Software’s team of over 60 software engineers are experts in Information Operations (IO), reverse engineering, vulnerability analysis, exploit development, intrusion and tamper detection, red team analysis, network security, software survivability, penetration testing, and operating system fortification with custom feature integration. We also do software development for all levels of programming, including device driver development, and embedded systems programming.

  • Posted in Solutions
  • Comments Off on Software Languages