On Thursday, attend my workshop at BruCON on r2ai and ghidraMCP over various #CTF challenges.

Human requirements:

- You have already reversed a few #binaries before, OR you have basic to good understanding of one #assembly.
- Brains, because #AI won't do it all for you :P

Laptop Requirements:

- a laptop ;P
- latest version of #Radare2
- latest version of #Ghidra
- #exegol or #docker installed
- some extra free space for some installs

cc: @radareorg

(if time, there's radare-mcp in bonus :)

Axelle Apvrille

Principal Security Researcher at Fortinet

There are many other interesting workshops at #BruCON

For example: Bluetooth Low Energy hacking with WHAD with @virtualabs @rcayre

link: https://brucon-0x11.sessionize.com/session/921719

cc: @ph0wn

Bluetooth Low Energy hacking with WHAD

This workshop will introduce you to our WHAD framework (WHAD stands for Wireless HAcking Devices or Wireless HAcking for Dummies, see https://whad.io) and its numerous tools designed to have fun with wireless devices in the wild, with a focus on Bluetooth Low Energy (BLE). Learn how to easily discover BLE devices, connect to them and analyze how they behave and expose information, how to clone a device and trick a smartphone to connect to it, how to interact with a device in many unexpected ways, and more importantly learn how this framework can help you build pretty efficient exploits in Python to complete the final challenge of this workshop ! We would be more than happy to get you started with Bluetooth Low Energy hacking with WHAD, and hope you'll enjoy the ride and dig into what this framework is capable of regarding other wireless protocols as well !