lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 7 Mar 2014 17:35:48 +0530
From: Sandeep Kamble <sandeepk.l337@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, 
 vuln@...unia.com, offsec <submit@...sec.com>,
 submissions@...ketstormsecurity.com, 
 submit@...7day.com, vuldb@...urityfocus.com, submit@...ecurity.com
Subject: Garage4Hackers Ranchoddas Series - Part 2 on
 Reverse Engineering - Free Webinar

Dear all,
Garage4Hacker invites you to join us for a webinar titled Data, data, data!
I can't make bricks without clay by Gynvael Coldwind - Google Security
Engineer and Dragon Sector Team Captain.

For Registration, please fill the following form.
https://docs.google.com/forms/d/1L3-...RlNdI/viewform<https://docs.google.com/forms/d/1L3-Wy49WZx97Aqujm5uRIjrLu02s9mTp20QVXjRlNdI/viewform>

Detailed Information about event :
http://www.garage4hackers.com/showthread.php?t=5875

Reverse Engineering is an art more than science. From the realms of
vulnerability discovery to debugging for internals, reverse engineers are a
rare breed with the ability to think backwards in the chain of events.
Discovering the technological principles of a device, object, or system
through analysis of its structure, function, and operation. With the growth
of exploit development and rise of malware attacks, reverse engineering is
becoming a key area to study.

*What to expect:*
The presentation would revolve more around the approaches taken in RE than
usage of tools. It will be focused on various practical tips and tricks
that can speed up the process of reverse-engineering. The presented
information will not be strictly tied to any specific platform or tool -
most of it can be applied on any architecture or operating system.

*Examples of topics:*
- how to start with an unknown architecture
- debugger scripting
- creating your own useful tools
- etc

*Prerequisites:*
- some reverse-engineering experience or general interest in
reverse-engineering
- basic programming skills
- basic knowledge of how the CPU and operating systems work

Kind Regard,
Garage4Hackers Team
Http://garage4hackers.com

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ