OWASP AppSecUSA 2012: reverse engineering .NET applications

Posted on Friday, December 14th, 2012 in code, reversed, security, Videos by the machinegeek

Last October the Open Web Application Security Project (OWASP) AppSecUSA 2012 conference was held in Austin, Texas. In this conference video Jon McCoy presents the practical information on reverse engineering .NET Framework Desktop Software. The presentation goes beyond basics to illustrate modification of security areas of apps. The speech is intended to give a security professional the basic understanding of how to do a light Black-Box code analysis, as well as provide programmers with the basics of finding, fighting or producing malware.

This entry was posted on Friday, December 14th, 2012 at 3:00 pm and is filed under code, reversed, security, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

3 Responses to “OWASP AppSecUSA 2012: reverse engineering .NET applications”

  1. Yeah, that’s what we need… more people learning how to produce malware.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Daniel: Do I comment here or on FB?
  • Craig B: Shouldn't the default be 00xxx010? Note that bit 0 appears out of order in the documentation. In that case I think the initial value is...
  • JJM: From the datasheet extract you are showing, the power up status should be 00xxx010, not 000xxx01. Bit numbering is misleading since 'measurement resolution' is apparently...
  • Jan Ciger (@janoc200): Hmm, that could actually explain why the three sensor IMU breakout I have bought a few years ago had all sorts of issues - I...
  • Travis: Is it preset to the windows 3 fingered salute?