addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1light-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

Cybersecurity Workshop

*Introduction to Software Reverse Engineering *             

Join us for the Women's Society of Cyberjutsu (WSC) Cybersecurity Workshop hosted from our Washington, DC location. This is a hands-on, practical workshop where you will put into practice those things you may have read or covered in a class. This is also a great way to keep your skills fresh if you’re a veteran.

Every workshop addresses beginner and advanced topic material. Beginners are encouraged to watch and learn as much as possible even though you may not have a clue. Exposure to new tools and techniques by watching will advance your learning process a lot quicker than trying to learn on your own. You will get to ask questions and see how it's done in the real world. Advanced attendees are encouraged to share and help answer "noob" questions as much as possible so everyone can learn from them.


How do I get this program to run?
What is this piece of code doing?
What is this program capable of?
How do I decode this program's network traffic?

Replace "program" with "malware" and "piece of code" with "exploit" and we can see how important these questions can be to incident response analysts.

This workshop will introduce you to the core concepts of Software Reverse Engineering (RE). For those who are already familiar with x86 Assembly, the hands-on labs will offer a challenging yet fun learning experience with the de-facto industry standard RE tool, InterActive Disassembler (IDA). For those with programming or scripting knowledge but no Assembly experience, you will learn how to read basic x86 Assembly. For those with no programming knowledge, basic programming concepts will be introduced.

The agenda will depend on the experience of those attending this workshop, but may follow this general outline:

1. What is RE? What are Programs?

2. Algorithms, Data Types and Structures

3. x86 Architecture, Assembly, and PE Files

4. The Reverser's Toolbox

5. Recognizing for-loops, arrays, and variable argument functions

6. Recognizing statements

7. Recognizing and dealing with recursion

8. Debugging without the source code

9. RE of Intermediate Languages (.NET, Java, Flash)

We are pleased to have Frank Poz as our presenter. Frank has been supporting a network security operations center for several years, performing malware analysis, packet analysis, and security engineering for (mostly) network defense purposes. Frank has contributed to course content for the series of courses, including Introduction to Reverse Engineering and Reverse Engineering of Malware, and has taught this material to security professionals of varying degrees of experience.


  • You must bring your own laptop.
  • Must be installed with Virtualbox.
  • You'll receive a link by email for the image(s) we'll be using.
  • Instructions will be provided by email for the above.


  • Knowledge of basic networking and IT.
  • Good attitude, willingness to learn and share.

Remote Participation:

If you are attending remotely you must register on the website. Once registered, you’ll receive the meeting participation info by email the day of the workshop. Please have a working webcam/mic. Expect to join 15-30 minutes prior to test your technical configurations.


Onsite - $20, Remote - $5

We only have room for 24 onsite so register early.

Refund Policy:

Refunds are offered if:

  • The workshop is cancelled
  • You cancel at least 1 day before the workshop; by 1000am Friday (April 5) morning

Use front door. POC:[masked]

Earn CPE's towards your certification

Food & beverages are provided

Free Parking

Join or login to comment.

  • Lily Y.

    It was great info, but would of like more opportunity to do more labs by cutting back the time working on one of the labs.

    April 6, 2013

  • Fi

    I registered as a remote participant... :D Talk to everyone soon.

    April 5, 2013

    • Lisa J.

      Under what name? Just making sure.

      April 5, 2013

    • Fi

      Fiona. Is there an email that was sent? I don't see it. (just making sure it is not a tech issue on my side) :D

      April 6, 2013

  • Tanuja

    Was planning to unfortunately need to do my taxes first. Looking forward to see the group soon though. Can we plan any happy hour during evening or on weekend?

    April 4, 2013

    • Lisa J.

      Yes, taxes are important! lol. Happy hour sounds very doable. Will schedule that soon.

      April 4, 2013

  • Chancey

    If anyone cancels, I'll be up for coming along.

    April 1, 2013

  • Angelina K.

    I also RSVP'd

    March 18, 2013

  • Lily Y.

    I just RSVP and paid but it is not showing up. Please let me know if you see my payment or not.

    March 18, 2013

  • Kathleen W.

    I have a conflict that day

    March 10, 2013

Your organizer's refund policy for Cybersecurity Workshop

Refunds offered if:

  • the Meetup is cancelled
  • you can cancel at least 1 day(s) before the Meetup

Additional notes: You must cancel at least 1 day before the workshop; by 1000am Friday (April 5) morning

Payments you make go to the organizer, not to Meetup. You must make refund requests to the organizer.

Regardless of the refund policy set by the organizer, Meetup may issue refunds on an organizer's behalf if we determine that Meetup's Payment Policies have been violated.

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy