Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
ShmooCon 2011: Visual Malware Reversing: How to Stop Reading Assembly n Love the Code
02-23-2012, 04:26 PM
Post: #1
ShmooCon 2011: Visual Malware Reversing: How to Stop Reading Assembly n Love the Code
Speaker: Danny Quist
Reverse engineering is a complicated process that has a lot of room for improvement. This talk will showcase some improvements to our visualization framework, VERA. New features that decrease the overall time to reverse a program will be shown. New items are a debugger based interface which allows for faster analysis without the need for a hypervisor, integrated trace processing tools, IDA Pro integration, and an API to interface with the display. During the talk I will reverse engineer malware samples, and show how to integrate it into your reversing process.

For more information visit: http://bit.ly/shmoocon2011_information
To download the video visit: http://bit.ly/shmoocon2011_videos





PDF slides:
Code:
http://www.offensivecomputing.net/shmoo2011/quist-shmoo2011.pdf

Regards,
Niraj Mohite - Th3 D!stu2b3d on3
BE (E&TC)
VAPT/Web Auditing Security Researcher
Cyber Security Professional-TMV
MCP, CCNA, CWNA, MCSE, RHCE, Novell
http://infosecplatform.wordpress.com/
Find all posts by this user
Like Post Quote this message in a reply
Post Reply 


Forum Jump:


User(s) browsing this thread: 1 Guest(s)