38C3

Ange Albertini

Ange Albertini has been a reverse engineer since the 80s, and started his Infosec career as a malware analyst decades ago.
His wide knowledge of file formats is available in his hundreds of Corkami posters and visualisations, and is essential for projects like Magika, the AI-powered file type detection at Google.
His passion for retrocomputing and funky files makes him explore the darkest corners of the files landscape: bypassing security with ancient techniques, analyzing parsers and breaking them with extreme files, writing tools to evade detections via mock files or polyglots such as PoC||GTFO, exploiting AES-GCM via crypto-polyglots or colliding SHA1 via Shattered.


Session

12-28
14:45
60min
Fearsome File Formats
Ange Albertini

The specs are enough, they said … yeah right.

10 years after 31c3's "Funky File Formats" …

Have things improved?

Security
Saal 1