Π£ Π½Π°Ρ Π²Ρ ΠΌΠΎΠΆΠ΅ΡΠ΅ ΠΏΠΎΡΠΌΠΎΡΡΠ΅ΡΡ Π±Π΅ΡΠΏΠ»Π°ΡΠ½ΠΎ Webinar: Reverse Engineering β How Attackers Uncover Secrets in Binaries ΠΈΠ»ΠΈ ΡΠΊΠ°ΡΠ°ΡΡ Π² ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎΠΌ Π΄ΠΎΡΡΡΠΏΠ½ΠΎΠΌ ΠΊΠ°ΡΠ΅ΡΡΠ²Π΅, Π²ΠΈΠ΄Π΅ΠΎ ΠΊΠΎΡΠΎΡΠΎΠ΅ Π±ΡΠ»ΠΎ Π·Π°Π³ΡΡΠΆΠ΅Π½ΠΎ Π½Π° ΡΡΡΠ±. ΠΠ»Ρ Π·Π°Π³ΡΡΠ·ΠΊΠΈ Π²ΡΠ±Π΅ΡΠΈΡΠ΅ Π²Π°ΡΠΈΠ°Π½Ρ ΠΈΠ· ΡΠΎΡΠΌΡ Π½ΠΈΠΆΠ΅:
ΠΡΠ»ΠΈ ΠΊΠ½ΠΎΠΏΠΊΠΈ ΡΠΊΠ°ΡΠΈΠ²Π°Π½ΠΈΡ Π½Π΅
Π·Π°Π³ΡΡΠ·ΠΈΠ»ΠΈΡΡ
ΠΠΠΠΠΠ’Π ΠΠΠΠ‘Π¬ ΠΈΠ»ΠΈ ΠΎΠ±Π½ΠΎΠ²ΠΈΡΠ΅ ΡΡΡΠ°Π½ΠΈΡΡ
ΠΡΠ»ΠΈ Π²ΠΎΠ·Π½ΠΈΠΊΠ°ΡΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌΡ ΡΠΎ ΡΠΊΠ°ΡΠΈΠ²Π°Π½ΠΈΠ΅ΠΌ Π²ΠΈΠ΄Π΅ΠΎ, ΠΏΠΎΠΆΠ°Π»ΡΠΉΡΡΠ° Π½Π°ΠΏΠΈΡΠΈΡΠ΅ Π² ΠΏΠΎΠ΄Π΄Π΅ΡΠΆΠΊΡ ΠΏΠΎ Π°Π΄ΡΠ΅ΡΡ Π²Π½ΠΈΠ·Ρ
ΡΡΡΠ°Π½ΠΈΡΡ.
Π‘ΠΏΠ°ΡΠΈΠ±ΠΎ Π·Π° ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ΅ΡΠ²ΠΈΡΠ° ClipSaver.ru
Speaker: Tim Blazytko, Β Β Β /Β @mr_phrazer9158Β Β Code and samples: https://github.com/emproof-com/webina... Slides: https://github.com/emproof-com/webina... Abstract: In our webinar βReverse Engineering: How Attackers Uncover Secrets in Binariesβ we will introduce the foundational concepts of reverse engineering from an attackerβs perspective. Reverse engineering is a crucial technique used by attackers to understand and manipulate software, turning low-level code into meaningful information. Participants will learn how reverse engineering is applied to extract secrets from binaries, pirate software, and identify bugs. The webinar will cover the following topics: Introduction to Reverse Engineering: What it is and why itβs a powerful tool for attackers. Motivation and Use Cases: Exploring reasons behind reverse engineering, such as secret extraction, piracy concerns, and bug discovery. From Binary to High-Level Code: A step-by-step guide from machine code to human-readable code. Key Tools for Reverse Engineering: An overview of disassemblers and decompilers, with a focus on Ghidra. Live Demonstration: A practical showcase of reverse engineering in action, with a focus on learning how to interpret code and extract hidden information. Designed for a partially technical audience with some programming experience but no prior knowledge of low-level languages, this session will provide insights into how attackers approach binary software. By understanding these techniques, attendees can develop a deeper awareness of the threats posed by reverse engineering and learn how to protect their systems. The webinar is aimed at raising awareness of the risks associated with reverse engineering and equipping attendees with practical knowledge they can use to analyze and defend against such attacks.