- Thomas AndersenChristopher VellaWindows Reverse Engineering (+Rust) from Scratch (Zero -> Kernel & All Things In-between)Cody NelsonAugust 5 - 8, 32 Credit Hours

Thomas Andersen
Christopher Vella
Windows Reverse Engineering (+Rust) from Scratch (Zero -> Kernel & All Things In-between)
Cody Nelson
August 5 - 8, 32 Credit Hours
Windows Reverse Engineering (+Rust) from Scratch (Zero -> Kernel & All Things In-between)
Thomas Andersen
Learn to make the most of static reverse engineering tools (with a heavy focus on static, we avoid running targets live to make the most of our static tooling!) to understand different Windows & x86/x64 targets (malware, vulnerability research targets, obfuscated code, arbitrary software)
In addition to the more expected Reverse Engineering content you also learn the underlying environment binaries operate on (x86-64, Boot process (UEFI|BIOS), PE32/32+ formats, Page Table concepts & Kernel/Hypervisor) alongside actual exercises in writing your own Kernel drivers and working with Rust to develop custom malware unpackers.
We also work with real APT samples & vulnerabilities, starting from scratch to enlighten the entire process of static reverse engineering.
Skills / Knowledge
- Malware
- AppSec
Issued on
August 8, 2023
Expires on
Does not expire