lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALq7B34OQqhtqLkCx8cZ+Y0rcwWPgWm6QWLdF++4Arom-HefkQ@mail.gmail.com>
Date: Mon, 17 Mar 2014 21:17:33 +0530
From: Sandeep Kamble <sandeepk.l337@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, 
 Secunia Research <vuln@...unia.com>, offsec <submit@...sec.com>, 
 submissions@...ketstormsecurity.com, submit@...7day.com, 
 vuldb@...urityfocus.com, submit@...ecurity.com
Subject: Re: Garage4Hackers Ranchoddas Series - Part 2 on
 Reverse Engineering - Free Webinar

Hello all,

There is less than 1 hour now remaining for the start of the webinar.

Catch it at http://www.garage4hackers.com/pages.php?pageid=4

Q&A will handled through :
1. IRC at #g4h on freenode
2. @garage4hackers on twitter
3. mail to sandeep@...age4hackers.com




On Fri, Mar 7, 2014 at 5:35 PM, Sandeep Kamble <sandeepk.l337@...il.com>wrote:

> Dear all,
> Garage4Hacker invites you to join us for a webinar titled Data, data,
> data! I can't make bricks without clay by Gynvael Coldwind - Google
> Security Engineer and Dragon Sector Team Captain.
>
> For Registration, please fill the following form.
> https://docs.google.com/forms/d/1L3-...RlNdI/viewform<https://docs.google.com/forms/d/1L3-Wy49WZx97Aqujm5uRIjrLu02s9mTp20QVXjRlNdI/viewform>
>
> Detailed Information about event :
> http://www.garage4hackers.com/showthread.php?t=5875
>
> Reverse Engineering is an art more than science. From the realms of
> vulnerability discovery to debugging for internals, reverse engineers are a
> rare breed with the ability to think backwards in the chain of events.
> Discovering the technological principles of a device, object, or system
> through analysis of its structure, function, and operation. With the growth
> of exploit development and rise of malware attacks, reverse engineering is
> becoming a key area to study.
>
> *What to expect:*
> The presentation would revolve more around the approaches taken in RE than
> usage of tools. It will be focused on various practical tips and tricks
> that can speed up the process of reverse-engineering. The presented
> information will not be strictly tied to any specific platform or tool -
> most of it can be applied on any architecture or operating system.
>
> *Examples of topics:*
> - how to start with an unknown architecture
> - debugger scripting
> - creating your own useful tools
> - etc
>
> *Prerequisites:*
> - some reverse-engineering experience or general interest in
> reverse-engineering
> - basic programming skills
> - basic knowledge of how the CPU and operating systems work
>
> Kind Regard,
> Garage4Hackers Team
> Http://garage4hackers.com
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ