Categories

OWASP AppSecUSA 2012: reverse engineering .NET applications

Posted on Friday, December 14th, 2012 in code, reversed, security, Videos by the machinegeek

Last October the Open Web Application Security Project (OWASP) AppSecUSA 2012 conference was held in Austin, Texas. In this conference video Jon McCoy presents the practical information on reverse engineering .NET Framework Desktop Software. The presentation goes beyond basics to illustrate modification of security areas of apps. The speech is intended to give a security professional the basic understanding of how to do a light Black-Box code analysis, as well as provide programmers with the basics of finding, fighting or producing malware.

This entry was posted on Friday, December 14th, 2012 at 3:00 pm and is filed under code, reversed, security, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

3 Responses to “OWASP AppSecUSA 2012: reverse engineering .NET applications”

  1. Yeah, that’s what we need… more people learning how to produce malware.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: TPS62200 will get him to under 15uA, a bit better than the 20-30uA he mentioned. I would try the same thing. Switch some resistors in...
  • KH: Yeah, it's an end-user thing. Very few people would spend hundreds of hours on this kind of project and sustain it. It's more or less...
  • Max: Not quite a dinosaur if you've seen Big Hero 6 though... wait. You've watched it with your kids, didn't you? That's cheating...! ;) One of...
  • Edward Mallon: A visiting researcher dropped by our humble basement workshop with questions about the physical skill level students would need if they added one of our...
  • KH: And that looks really expensive... Only browsed the vid though, I'm an dinosaur so I had the sound off too. Nice of him to open-source...