{"id":3203,"date":"2011-10-06T16:42:23","date_gmt":"2011-10-06T15:42:23","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3203"},"modified":"2017-06-05T01:00:26","modified_gmt":"2017-06-04T17:00:26","slug":"ciat-the-cryptographic-implementations-analysis-toolkit","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/10\/ciat-the-cryptographic-implementations-analysis-toolkit\/","title":{"rendered":"CIAT – The Cryptographic Implementations Analysis Toolkit"},"content":{"rendered":"

The Cryptographic Implementations Analysis Toolkit (CIAT) is a compendium of command line and graphical tools whose aim is to help in the detection and analysis of encrypted byte sequences within files (executable and non-executable). It is particularly helpful in the forensic analysis and reverse engineering of malware using cryptographic code and encrypted payloads.<\/p>\n

This was an interesting find because it wasn’t too long ago I published a post about Mediggo, a Tool To Detect Weak Or Insecure Cryptosystems Using Generic Cryptanalysis Techniques<\/a>.<\/p>\n

Requirements <\/strong><\/p>\n

Windows Binaries included in this distribution as well as supporting libraries were compiled using gcc, Mingw and Msys. <\/p>\n

Linux binaries were compiled using gcc 4.1.2. They were tested from command line in machine with Windows Vista Home Premium (32 bit + SP1) and on Linux Gentoo 2008.0 X86 operating systems.
\n