REcon 2008 July 13, 2008 to July 15, 2008, Montreal,Canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Building plugins for IDA Pro Ilfak Guilfanov IDA Pro is not just a disassembler but an open platform that can be used ...
Hacking Culture Micheal Strangelove As more of our shared cultured is privatized and turned into commodities we lose control ...
Polymorphic Virus Analysis Nicolas Brulez N/A
How I learned Reverse Engineering with Storm Pierre-marc Bureau The Storm Worm is a family of malware that has been present on the Internet ...
RE:Trace - Applied Reverse Engineering on OS X Tiller Beauchamp This paper will detail the newest developments in RE:Trace, a reverse engineering framework based on ...
Social Engineering for the "Socially Inept" Sharon Conheady , Alex Bayly Social Engineering For the "Socially Inept" will show how skills commonly thought of as "geeky" ...
Methods for analyzing malicious Office documents Bruce Dang In the last couple years, there has been a lot of press coverage on targeted ...
64-bit Imports Rebuilding and Unpacking Sèbastien Doucet With 64-bit packers and protectors being released, there is presently a growing need to create ...
Windows privilege escalation through LPC & ALPC interfaces Thomas Garnier This presentation addresses reported security issues on both LPC (Local Procedure Call) and ALPC (Advanced ...
Under the iHood Cameron Hotchkies The market share for Apple devices has grown considerably over the past few years, but ...
The Deobfuscator Eric D. Laspe The Deobfuscator is an IDA Pro plug-in that neutralizes anti-disassembly code and transforms obfuscated code ...
Bypassing Security Protections by Backdooring libc Anthony Lopes In this short talk, I will describe several methods obtaining root after obtaining a normal ...
Reverse Engineering Dynamic Languages, a Focus on Python Aaron Portnoy , Ali Rizvi-santiago Every day more and more programmers are making the switch from traditional compiled languages such ...
NetWare kernel stack overflow exploitation Nicolas Pouvesle Although a lot of research has been done into exploiting remote buffer overflows in kernel ...
Helikaon Linux Debuger Jason Raber The Linux OS is not immune to malware and viruses. The reverse engineer is faced ...
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework Gera A couple of years ago in ReCon 2006 Pedram Amini presented PAIMEI. This awesome framework ...
Creating Code Obfuscation Virtual Machines Craig Smith This is the VM Creation 101 talk. The talk details what a virtual machine is ...
RE over Adobe Acrobat Reader using Immunity Debugger Pablo Solè Nowadays, security research and vulnerability assessment is becoming more specific and attacks tends to be ...
Blackbox Reversing Of XSS Filters Alexander Sotirov Many of us limit ourselves to what we already know and don't look for new ...