I'm not usually one for introduction posts/topics, but then I thought some more about it and figured in this case it'd be a good place to write down some notes on what I'm interested in when it comes to crypto/security stuff... so here goes.
Who are you?
I'm a compsci student—I have an interest in computer security and cryptography, but I'm also interested in other areas of CS such as compiler construction, programming language desgin, computer graphics etc.
My interest in compsci dates back to several years, and security/crypto a bit less... but it's always been there to some degree or another.
Here's where it gets interesting... I've done a bit of binary reversing, but my main interest is really in what I usually call "file format reversing", for lack of a proper word. Sometimes you have some binary format that you want to understand the structure of, but for one reason or another the binary that parses this structure isn't available. Instead, you have to rely on simply looking at the file content and try to infer the structure from that.
To me, this becomes a bit like a puzzle, sort of like a crossword—you typically start by looking at the header and figure out its structure to a reasonable extent, and then you use the header data to find out how other parts of the file is structured. The details depend on what exactly the format encodes—is it an image, or sound data, or an archive file, or maybe some kind of bytecode for a VM?
My main efforts have been put into reversing file formats used in video games, so far, since those tend to be full of custom file formats. My workflow when reversing formats is a bit peculiar since I never really liked hex editors much, but I was thinking I might write something about how I approach file format RE, in case that would be interesting?
Something else I've been meaning to do is some kind of puzzles/mini-CTF-ish thing oriented around this kind of RE, since it's somewhat niche but I'm sure I'm not the only person interested in it. It'd like somewhere in-between traditional executable reversing and forensics tasks, in that the main challenge is in understanding (as in reversing), and unlike forensics-type tasks the formats aren't standard but rather completely custom. I guess it'd be nice to know if people would find this interesting as well.
How'd you find us?
@worz invited me after we'd chatted a bit on IRC. I'm a sucker for IRC, so if nowhere else, that is probably where to find me.