Reverse Engineering Malware and Mitigation Techniques
Ever wondered how malware manages to exploit vulnerabities in order to run shellcode? And how advanced mitigation technologies, such as DEP, ASLR, EMET, etc., manage to block them? In this session, we not only reverse engineer some existing malware samples, but also the mitigation techniques that are available to you. Be ready for a deep dive in the malware reverse engineering world... if looking at assembler and binary code gives you a bad feeling, than this session is not for you!