Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Reverse Engineering Broken Arrows

Type
Slides
Tags
reverse engineering
Authors
Adam Meyers
Event
Source Conference Boston 2010
Indexed on
Mar 26, 2013
URL
http://www.sourceconference.com/bos10pubs/Broken%20Arrows%20Source.pdf
File name
Broken%20Arrows%20Source.pdf
File size
1.9 MB
MD5
1f58046001b3e54c1e6795a577c95a88
SHA1
cba9868ee560d013d01e634b455ccd2fa1663c37

This session will introduce the concepts of exploit reverse engineering in support of incident response and/or post mortem analysis. Attendees will learn the tools and techniques required to take malicious exploit code and understand what it is targeting and how to identify and prevent future success against the enterprise. This will include a live demonstration of the techniques to re-enforce how to reverse exploit code.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !