DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering
Your precious 0-day? That meticulously crafted exploit? The perfect foothold? At some point, they'll be captured, dissected, and put on display. Reverse engineers. When they begin snooping through your hard work, it pays to have planned out your defense ahead of time. You can take the traditional defensive route - encryption, obfuscation, anti-debugging - or you can go on the offense, and attack the heart and soul of anyone who dare look at your perfect code. With some carefully crafted assembly, we'll show how to break down a reverse engineer by sending them misleading, intimidating, and demoralizing messages through the control flow graphs of their favorite RE tools - turning their beloved IDA (Hopper, BinNavi, Radare, etc) into unwitting weapons for devastating psychological warfare in reverse engineering.
SOeaker bio:
Chris is an embedded systems engineer and cyber security researcher, focused on innovative approaches to low level hardware and software RE and exploitation.
Twitter: @xoreaxeaxeax
Видео DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering канала DEFCONConference
SOeaker bio:
Chris is an embedded systems engineer and cyber security researcher, focused on innovative approaches to low level hardware and software RE and exploitation.
Twitter: @xoreaxeaxeax
Видео DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering канала DEFCONConference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation](https://i.ytimg.com/vi/lR0nh-TdpVg/default.jpg)
![DEF CON 23 - Cory Doctorow - Fighting Back in the War on General Purpose Computers](https://i.ytimg.com/vi/pT6itfUUsoQ/default.jpg)
![Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?](https://i.ytimg.com/vi/hbqVNlwfjxo/default.jpg)
![Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference](https://i.ytimg.com/vi/vQtLms02PFM/default.jpg)
![SirenJack: Cracking a 'Secure' Emergency Warning Siren System](https://i.ytimg.com/vi/49KoUmiJuts/default.jpg)
![Breaking the x86 Instruction Set](https://i.ytimg.com/vi/KrksBdWcZgQ/default.jpg)
![DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle](https://i.ytimg.com/vi/OobLb1McxnI/default.jpg)
![GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs](https://i.ytimg.com/vi/_eSAF_qT_FY/default.jpg)
![DEF CON 24 - Hardware Hacking Village - Matt DuHarte - Basic Firmware Extraction](https://i.ytimg.com/vi/Kxvpbu9STU4/default.jpg)
![Defcon 21 - Social Engineering: The Gentleman Thief](https://i.ytimg.com/vi/1kkOKvPrdZ4/default.jpg)
![Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference](https://i.ytimg.com/vi/1IoythC_pIY/default.jpg)
![DEFCON 19: The Art of Trolling (w speaker)](https://i.ytimg.com/vi/AHqGV5WjS4w/default.jpg)
![Robin Dreeke - Sizing People Up - DEF CON 27 Social Engineering Village](https://i.ytimg.com/vi/H3XR4QrJyxA/default.jpg)
![4 2 1 Christopher Domas The future of RE Dynamic Binary Visualization](https://i.ytimg.com/vi/4bM3Gut1hIk/default.jpg)
![reductio ad absurdum by Christopher Domas](https://i.ytimg.com/vi/NmWwRmvjAE8/default.jpg)
![](https://i.ytimg.com/vi/sVdBAP9Csa4/default.jpg)
![DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit ( w speaker)](https://i.ytimg.com/vi/hABj_mrP-no/default.jpg)
![Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here](https://i.ytimg.com/vi/NG9Cg_vBKOg/default.jpg)
![DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline](https://i.ytimg.com/vi/5CzURm7OpAA/default.jpg)
![DEF CON 25 - XlogicX - Assembly Language is Too High Level](https://i.ytimg.com/vi/eunYrrcxXfw/default.jpg)