Abstract

This session would cover the basics of GDB and how you can use it as your first step towards reverse engineering and then later identifying a vulnerability which you might want to exploit. This session would act as a follow up session to my previous talk on Return Oriented Programming in Bangalore. This session would also cover using other tools for reverse engineering like ltrace, strace, objdump and how to employ these tools in identifying overflow attacks or return based attacks(jump attacks).

We will be using gdb for following jobs -
Runtime analysis
Manipulating program flows
Disassembly
Reverse engineering

Knowledge-wise, the only preprequisite that you might require is basic understanding of the C code. Other software prerequisites for this session would be released soon

Speaker

Mihir Shah

Timing

Starts at Saturday January 19 2019, 10:10 AM. The sessions runs for about 4 hours.

Resources