OWASP AppSecUSA 2012: reverse engineering .NET applications

Posted on Friday, December 14th, 2012 in code, reversed, security, Videos by the machinegeek

Last October the Open Web Application Security Project (OWASP) AppSecUSA 2012 conference was held in Austin, Texas. In this conference video Jon McCoy presents the practical information on reverse engineering .NET Framework Desktop Software. The presentation goes beyond basics to illustrate modification of security areas of apps. The speech is intended to give a security professional the basic understanding of how to do a light Black-Box code analysis, as well as provide programmers with the basics of finding, fighting or producing malware.

This entry was posted on Friday, December 14th, 2012 at 3:00 pm and is filed under code, reversed, security, Videos. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

3 Responses to “OWASP AppSecUSA 2012: reverse engineering .NET applications”

  1. Yeah, that’s what we need… more people learning how to produce malware.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • KH: He had qualms about electrolytic cap leakage impacting sleep current. I think such leakage is very low and hard to measure using hobby equipment, so...
  • Mike: Love these! great source for makers!
  • KH: Is my eyes playing tricks on me or did he just use gobs and gobs of solder on the top side?
  • Doug: When do we find out the winner??
  • KH: Oh wowsers, you're right, now that I've looked at his page, horrors, another scary copper pour. That thing also needs a box... I hope nobody...