*Introduction to Software Reverse Engineering *
Join us for the Women's Society of Cyberjutsu (WSC) Cybersecurity Workshop hosted from our Washington, DC location. This is a hands-on, practical workshop where you will put into practice those things you may have read or covered in a class. This is also a great way to keep your skills fresh if you’re a veteran.
Every workshop addresses beginner and advanced topic material. Beginners are encouraged to watch and learn as much as possible even though you may not have a clue. Exposure to new tools and techniques by watching will advance your learning process a lot quicker than trying to learn on your own. You will get to ask questions and see how it's done in the real world. Advanced attendees are encouraged to share and help answer "noob" questions as much as possible so everyone can learn from them.
How do I get this program to run?
What is this piece of code doing?
What is this program capable of?
How do I decode this program's network traffic?
Replace "program" with "malware" and "piece of code" with "exploit" and we can see how important these questions can be to incident response analysts.
This workshop will introduce you to the core concepts of Software Reverse Engineering (RE). For those who are already familiar with x86 Assembly, the hands-on labs will offer a challenging yet fun learning experience with the de-facto industry standard RE tool, InterActive Disassembler (IDA). For those with programming or scripting knowledge but no Assembly experience, you will learn how to read basic x86 Assembly. For those with no programming knowledge, basic programming concepts will be introduced.
The agenda will depend on the experience of those attending this workshop, but may follow this general outline:
1. What is RE? What are Programs?
2. Algorithms, Data Types and Structures
3. x86 Architecture, Assembly, and PE Files
4. The Reverser's Toolbox
5. Recognizing for-loops, arrays, and variable argument functions
6. Recognizing switch..case statements
7. Recognizing and dealing with recursion
8. Debugging without the source code
9. RE of Intermediate Languages (.NET, Java, Flash)
We are pleased to have Frank Poz as our presenter. Frank has been supporting a network security operations center for several years, performing malware analysis, packet analysis, and security engineering for (mostly) network defense purposes. Frank has contributed to course content for the OpenSecurityTraining.info series of courses, including Introduction to Reverse Engineering and Reverse Engineering of Malware, and has taught this material to security professionals of varying degrees of experience.
- You must bring your own laptop.
- Must be installed with Virtualbox.
- You'll receive a link by email for the image(s) we'll be using.
- Instructions will be provided by email for the above.
- Knowledge of basic networking and IT.
- Good attitude, willingness to learn and share.
If you are attending remotely you must register on the website as well. Once registered, you’ll receive the meeting participation info by email the day of the workshop. Please have a working webcam/mic. Expect to join 15-30 minutes prior to test your technical configurations.
Onsite - $20, Remote - $5
We only have room for 24 onsite so register early.
Refunds are offered if:
- The workshop is cancelled
- You cancel at least 1 day before the workshop; by 1000am Friday (April 5) morning
Use front door. POC:[masked]
Earn CPE's towards your certification
Food & beverages are provided