OWASP AppSecUSA 2012: reverse engineering .NET applications

Posted on Friday, December 14th, 2012 in code, reversed, security, Videos by the machinegeek

Last October the Open Web Application Security Project (OWASP) AppSecUSA 2012 conference was held in Austin, Texas. In this conference video Jon McCoy presents the practical information on reverse engineering .NET Framework Desktop Software. The presentation goes beyond basics to illustrate modification of security areas of apps. The speech is intended to give a security professional the basic understanding of how to do a light Black-Box code analysis, as well as provide programmers with the basics of finding, fighting or producing malware.

This entry was posted on Friday, December 14th, 2012 at 3:00 pm and is filed under code, reversed, security, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

3 Responses to “OWASP AppSecUSA 2012: reverse engineering .NET applications”

  1. Yeah, that’s what we need… more people learning how to produce malware.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Paul Campbell: I'm old enough that I started programming with punched cards .... each card had a sequence number in the last few characters. A friend once...
  • Ian: test comment on /blog/ page
  • ian: No, that's exactly how it should be :) Sorry about missing names on comments, the theme is being reworked as we speak.
  • J. Peterson: Nice writeup. It looks like some of the formatting for your command examples needs some missing newlines?
  • Geert Jordaens: I'm not sure what kind of licensing I have to add since it is a fairly straight forward implementation of the adaptive Huffman Decoding. For...