Reverse Engineering Malware and Mitigation Techniques

Play Reverse Engineering Malware and Mitigation Techniques
Sign in to queue

The Discussion

  • User profile image
    Martin Rosselle

    I very much appreciated how clear and concise you covered the different techniques. Mostly clear, have to review the packing strategy though and ROP, not for the faint of heart :-)

    Nevertheless, I like it a lot.

    Cheers, Martin

  • User profile image
    bukem

    Very informative presentation, pity you couldn't show all the examples and ran out of the time. I also miss the q&a part not being recorded. And it seems that manually crafting the ROP exploits from original shellcode is a daunting work unless there are good automation tools.

  • User profile image
    John

    Great session!

Add Your 2 Cents