REcon 2008 July 13, 2008 to July 15, 2008, Montreal,Canada
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Building plugins for IDA Pro | Ilfak Guilfanov | IDA Pro is not just a disassembler but an open platform that can be used ... | |
Hacking Culture | Micheal Strangelove | As more of our shared cultured is privatized and turned into commodities we lose control ... | |
Polymorphic Virus Analysis | Nicolas Brulez | N/A | |
How I learned Reverse Engineering with Storm | Pierre-marc Bureau | The Storm Worm is a family of malware that has been present on the Internet ... | |
RE:Trace - Applied Reverse Engineering on OS X | Tiller Beauchamp | This paper will detail the newest developments in RE:Trace, a reverse engineering framework based on ... | |
Social Engineering for the "Socially Inept" | Alex Bayly , Sharon Conheady | Social Engineering For the "Socially Inept" will show how skills commonly thought of as "geeky" ... | |
Methods for analyzing malicious Office documents | Bruce Dang | In the last couple years, there has been a lot of press coverage on targeted ... | |
64-bit Imports Rebuilding and Unpacking | Sèbastien Doucet | With 64-bit packers and protectors being released, there is presently a growing need to create ... | |
Windows privilege escalation through LPC & ALPC interfaces | Thomas Garnier | This presentation addresses reported security issues on both LPC (Local Procedure Call) and ALPC (Advanced ... | |
Under the iHood | Cameron Hotchkies | The market share for Apple devices has grown considerably over the past few years, but ... | |
The Deobfuscator | Eric D. Laspe | The Deobfuscator is an IDA Pro plug-in that neutralizes anti-disassembly code and transforms obfuscated code ... | |
Bypassing Security Protections by Backdooring libc | Anthony Lopes | In this short talk, I will describe several methods obtaining root after obtaining a normal ... | |
Reverse Engineering Dynamic Languages, a Focus on Python | Aaron Portnoy , Ali Rizvi-santiago | Every day more and more programmers are making the switch from traditional compiled languages such ... | |
NetWare kernel stack overflow exploitation | Nicolas Pouvesle | Although a lot of research has been done into exploiting remote buffer overflows in kernel ... | |
Helikaon Linux Debuger | Jason Raber | The Linux OS is not immune to malware and viruses. The reverse engineer is faced ... | |
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework | Gera | A couple of years ago in ReCon 2006 Pedram Amini presented PAIMEI. This awesome framework ... | |
Creating Code Obfuscation Virtual Machines | Craig Smith | This is the VM Creation 101 talk. The talk details what a virtual machine is ... | |
RE over Adobe Acrobat Reader using Immunity Debugger | Pablo Solè | Nowadays, security research and vulnerability assessment is becoming more specific and attacks tends to be ... | |
Blackbox Reversing Of XSS Filters | Alexander Sotirov | Many of us limit ourselves to what we already know and don't look for new ... |