lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CALq7B35Bf+g2eqMD783vxmZXAVLrJKsZD3tHH7xzR_nJP5-JGA@mail.gmail.com>
Date: Mon, 17 Mar 2014 23:18:05 +0530
From: Sandeep Kamble <sandeepk.l337@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com, 
 Secunia Research <vuln@...unia.com>, offsec <submit@...sec.com>, 
 submissions@...ketstormsecurity.com, submit@...7day.com, 
 vuldb@...urityfocus.com, submit@...ecurity.com
Subject: Re: Garage4Hackers Ranchoddas Series - Part 2 on
 Reverse Engineering - Free Webinar

Dear All, There has been a issue with hangout service as the Google
servers. Hence use below given link to join the webinar. Apologies for the
inconvenience and delay.

We have changed webcast link.

please join us : http://www.twitch.tv/gyndream/




On Fri, Mar 7, 2014 at 5:35 PM, Sandeep Kamble <sandeepk.l337@...il.com>wrote:

> Dear all,
> Garage4Hacker invites you to join us for a webinar titled Data, data,
> data! I can't make bricks without clay by Gynvael Coldwind - Google
> Security Engineer and Dragon Sector Team Captain.
>
> For Registration, please fill the following form.
> https://docs.google.com/forms/d/1L3-...RlNdI/viewform<https://docs.google.com/forms/d/1L3-Wy49WZx97Aqujm5uRIjrLu02s9mTp20QVXjRlNdI/viewform>
>
> Detailed Information about event :
> http://www.garage4hackers.com/showthread.php?t=5875
>
> Reverse Engineering is an art more than science. From the realms of
> vulnerability discovery to debugging for internals, reverse engineers are a
> rare breed with the ability to think backwards in the chain of events.
> Discovering the technological principles of a device, object, or system
> through analysis of its structure, function, and operation. With the growth
> of exploit development and rise of malware attacks, reverse engineering is
> becoming a key area to study.
>
> *What to expect:*
> The presentation would revolve more around the approaches taken in RE than
> usage of tools. It will be focused on various practical tips and tricks
> that can speed up the process of reverse-engineering. The presented
> information will not be strictly tied to any specific platform or tool -
> most of it can be applied on any architecture or operating system.
>
> *Examples of topics:*
> - how to start with an unknown architecture
> - debugger scripting
> - creating your own useful tools
> - etc
>
> *Prerequisites:*
> - some reverse-engineering experience or general interest in
> reverse-engineering
> - basic programming skills
> - basic knowledge of how the CPU and operating systems work
>
> Kind Regard,
> Garage4Hackers Team
> Http://garage4hackers.com
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ