-
-
Replying to @pwnallthethings @matthew_d_green
I think that's 100% technically feasible, and useful in an operational context.
1 reply 0 retweets 1 like -
You would need something to extract semantic understanding of a module, something to carve it out, and something to carve it into.
1 reply 0 retweets 1 like -
This is precisely one use case for mcsema. Ex, identify the C2 module in a piece of malware, lift it out, patch it into your own code.
1 reply 0 retweets 0 likes -
I'm sure you could stitch together a full program from found parts. Like, grab a webcam module from here, and a keylogger from there, etc
1 reply 0 retweets 0 likes -
Replying to @dguido @matthew_d_green
Sure. But it's easier to write your own. Repurposing malware -- especially binaries in the field -- is way harder than writing from scratch.
1 reply 0 retweets 1 like -
Replying to @pwnallthethings @matthew_d_green
Not so sure. The military can't even hire enough operators let alone developers. They could have experts design an automated system once.
3 replies 0 retweets 0 likes
There have been a half dozen DARPA programs for binary rewriting over the last few years. This sounds like a thing they could easily build.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.