🦀 The slides for my workshop at @recon in Montreal this year, "Reversing Rust Binaries: One Step Beyond Strings", are now online!

https://github.com/cxiao/rust-reversing-workshop-recon-2024/tree/main/slides

You can find both the slides and the diagrams I used for the workshop linked there. The slides are meant to be a resource for you to use while reversing, so they have lots of clickable links in them (:

In case you lose the link, you can also find the slides linked from my page on the REcon 2024 schedule: https://cfp.recon.cx/recon2024/talk/QCA37X/

Really great to meet so many cool people, and lots of work to do for Rust RE going forward! I left the conference with a lot of great ideas and directions for new research.

#REcon2024 #reconmtl #rustlang #reverseengineering #reversing #malwareanalysis

rust-reversing-workshop-recon-2024/slides at main · cxiao/rust-reversing-workshop-recon-2024

Contribute to cxiao/rust-reversing-workshop-recon-2024 development by creating an account on GitHub.

GitHub

We're stoked we got to present about low-level #IBMi internals today at @recon! Here you can find our detailed writeup:

https://silentsignal.github.io/BelowMI/

We also released our @kaitai definition for the *PGM serialization format:

https://github.com/silentsignal/PGM-Kaitai

...and our #Ghidra extensions:

https://github.com/silentsignal/PowerAS

Stay tuned for slides and demos!

#REcon24 #REconmtl #REcon2024

Below MI - IBM i for Hackers

Hello @recon attendees! My workshop, Reversing Rust Binaries: One Step Beyond Strings will be delayed by one hour, and will run from 4:30 pm to 6:30 pm today in Soprano B.

#reconmtl #recon #REcon2024

🦀 Hello Rust reversers! If you're at @recon in Montreal this year, come check out my workshop, Reversing Rust Binaries: One Step Beyond Strings! It will be Friday June 28th, at 2:30 pm, in Soprano B.

https://cfp.recon.cx/recon2024/talk/QCA37X/

For pre-workshop setup instructions, including a prebuilt VM, prebuilt binaries, and sample code, see https://github.com/cxiao/rust-reversing-workshop-recon-2024

Hope to see many of you there!

#REcon2024 #reconmtl #rustlang #reverseengineering #reversing #malwareanalysis

Reversing Rust Binaries: One step beyond strings (workshop) Recon 2024

Are you a seasoned reverse engineer, but you tremble when a Rust binary lands on your desk? When you encounter a Rust binary, do you just run `strings` on it and hope for the best? We will take a single problem - string recovery from a Rust binary - and uses it as an approachable starting point for exploring reversing Rust binaries. We will cover: What are the practical steps we need to take to recover strings? How are strings represented in memory, passed between functions, and manipulated throughout the program? Once we recover the strings, what do the strings mean? What can the strings we recover tell us about the compiler, language runtime, standard library, and third-party libraries in the binary? This workshop is intended for reverse engineers and malware analysts who are familiar with reversing C or C++ binaries, but who are unfamiliar with the Rust programming language. For pre-workshop setup instructions, including a prebuilt VM, prebuilt binaries, and sample code, see https://github.com/cxiao/rust-reversing-workshop-recon-2024

Happy to present "Unleashing AI: The Future of Reverse Engineering with Large Language Models" with @mu00d8 at
@recon We'll cover current & future RE applications, running offline models and enhancing results by merging LLMs with static analysis.

https://recon.cx/2024/presentations.html

#reverseengineering #malwareanalysis #malware #AI #LLM #REcon2024

REcon - Home

REcon # Montreal Security Conference # Reverse Engineering Training