For some reason I was compelled the other day to go through various binaries for software we have at work and strings them. Usually it's not very exciting, but lots of times with malware we get to see some pretty funny/cool stuff in the binaries. So this time I did a strings on Splunk.

Oh boy does the sillyness</a> ever end.

What I'd like to know more than anything is what the heck is the binary doing at that point in the code? I notice the OutputTransformRaw function call (if that's what it is) but why is there a splat ascii pic in the binary. And, more importantly, what command can I run to see it :-)

In other news, I finished documenting and unit testing</a> the API we use at work! Horray!