ReVa automatically solving a CTF challenge

Поделиться
HTML-код
  • Опубликовано: 6 июл 2024
  • ReVa the Reverse Engineering Assistant solves a simple CTF challenge without human help!
  • НаукаНаука

Комментарии • 20

  • @felfoxling
    @felfoxling 23 дня назад

    Your streams are always so fun and educational to watch! I can't wait to see more from you!

  • @resonanceofambition
    @resonanceofambition 25 дней назад +3

    I remember seeing "Ghost in the Shell 2: Innocence" for the first time as a child- Completely nerded out by the Chinese IPS robots trying to stop the attack nearing the end of the film. Loved how they were just super quickly talking to each other about what they were doing and how the attack was progressing. Never did I expect to see the day that AI's actually compete against each other in CTF events. Less so human beings toying with this kind of tech from home. I still do believe almost everything in Sci-Fi we come up with is less about "how we see the future" and more about "We're just about to cook this". Lots of films like these deal with concepts such as immortality, god-like AI's, absolute defense, megastructures, regeneration etc. etc. Makes one wonder how many of these are right around the corner.

    • @cyberkaida
      @cyberkaida  24 дня назад

      I am currently working on a plan and team approach in ReVa. I am building a "RE workflow" into the model to make it work more like a human reverse engineer. It will take the question, create a plan, perform research on the binary, then summarise and loop.
      In my approach I have the ReVa work in real time with the human through Ghidra. I already have a small team of LLMs working on the database at the same time. ReVa can split your question into pieces and work on each piece in a thread. This is very expensive in compute though, so I need to improve the multiple model support.
      If you use this feature it is ~$5USD in OpenAI credit for a malware sample report.

  • @Hamled
    @Hamled 11 дней назад

    Looks great! Would love to do a comparison between this and angr/Manticore or other symbolic analysis tools, for automated RE challenge solving.

  • @imamalox
    @imamalox 25 дней назад +1

    This is so cool. To be fair this looked like a beginner level CTF, but it's still cool to see we can use LLM for these kinds of applications as well!

    • @cyberkaida
      @cyberkaida  24 дня назад +1

      Yes, this is an easy challenge for a human but for a LLM it is a difficult test. This is a data obfuscation challenge and is the worst case for current models. The tokeniser breaks the relationship between bytes, this means the LLM doesn't learn well during training. This and causes many issues with a basic approach (reversing a string is difficult for an LLM).
      With my approach in ReVa I give the LLM tools that move the work and allow it to solve challenges like these, the "thinking" is performed in the LLM and the data deobfuscation is performed in Ghidra and Python.
      I can show a more complex example of ReVa reverse engineering a large malware or kernel extension, these are actually easier for the model!

  • @AngDeLuca
    @AngDeLuca 25 дней назад +2

    I’m going to need that Ghidra theme 😍

    • @cyberkaida
      @cyberkaida  24 дня назад

      It is included! In the project view, you can press Edit -> Theme -> Switch. Mine is Flat Dark with the font bigger for streaming!

    • @AngDeLuca
      @AngDeLuca 23 дня назад

      @@cyberkaida wtf. How did I not see that menu? Lmao, thanks!

    • @cyberkaida
      @cyberkaida  23 дня назад +1

      @@AngDeLuca I am happy to help!

  • @ammrysir
    @ammrysir 27 дней назад +5

    dang cool asf. Hey, what tools did u use for reverse engineering?

    • @cyberkaida
      @cyberkaida  26 дней назад +3

      This is Ghidra and my own tool ReVa. This challenge is an old one from HackTheBox.
      If you are interested you can find ReVa here:
      github.com/cyberkaida/reverse-engineering-assistant
      And you can find Ghidra here:
      github.com/NationalSecurityAgency/ghidra

    • @ammrysir
      @ammrysir 25 дней назад

      @@cyberkaida dang, cant understand many thing even though i called myself a programmer.

    • @psyker4321
      @psyker4321 25 дней назад

      @@cyberkaida were going to have to completely obfuscate all code from now on arent we

  • @Pamir026
    @Pamir026 25 дней назад

    WOW! This is exceptionally cool!

    • @cyberkaida
      @cyberkaida  24 дня назад

      Thank you! I am improving ReVa each week!

  • @EmmanuelMessulam
    @EmmanuelMessulam 25 дней назад

    Soo coool!

  • @cscscscss
    @cscscscss 25 дней назад

    auto arg solver

  • @rafa_br34
    @rafa_br34 24 дня назад

    Oh cool a CTF that takes 1 minute to solve done in two minutes by an LLM.

    • @cyberkaida
      @cyberkaida  23 дня назад

      It is like a dishwasher. It can take longer, but you are not washing. ReVa is an assistant that can help with simple tasks and work on the same database at the same time you are. This can help with easy things, so you can focus on harder things.
      This task is hard for LLM based tools. It is an encoding problem and the meaning is lost in the tokeniser step. ReVa is doing it well because it is using a generic tool approach with tools designed for LLM use.