|=------------------------------------------------------------------------------------------------=|

 ########  ######## ########  ######   #######  ##    ##    ########   #######  ##     ## ######## 
 ##     ## ##       ##       ##    ## ##     ## ###   ##    ##     ## ##     ## ###   ### ##       
 ##     ## ##       ##       ##       ##     ## ####  ##    ##     ## ##     ## #### #### ##       
 ##     ## ######   ######   ##       ##     ## ## ## ##    ########  ##     ## ## ### ## ######   
 ##     ## ##       ##       ##       ##     ## ##  ####    ##   ##   ##     ## ##     ## ##       
 ##     ## ##       ##       ##    ## ##     ## ##   ###    ##    ##  ##     ## ##     ## ##       
 ########  ######## ##        ######   #######  ##    ##    ##     ##  #######  ##     ## ######## 
 
|=------------------------------------------------------------------------------------------------=|

                                 DEF CON group 11396 @ Rome, Italy
                                
                               [Main] [Meetings] [Posts] [Projects] 


|=----------------------------------------=[ March 2019 ]=----------------------------------------=|

by malweisse
This is the 6th meeting of the DEF CON group. Date and location: March 29th from 5 p.m. to 7 p.m. in the B2 room at the Department of Computer, Control, and Management Engineering (DIAG) Antonio Ruberti at Sapienza University of Rome. The schedule is: ---[ Ghidra: reviewing the new player in the RE scene, by Blazef104 In the past few months the hype grew around the announcement of a novel open source tool for Reverse Engineering (RE) named Ghidra and developed by NSA which was set to be released in March 2019. Now that Ghidra hit the web it is time to get our hands dirty and see if it can keep up with all the promises, finally providing a great (free) alternative to IDA pro. In the talk we will go through the main features of the program, explore its best selling points and compare it with its main competitor. We will also see a quick demo on a simple executable to show a possible real life scenario. Slides link: https://docs.google.com/presentation/d/1O8EqzydwZvqYaTz8ie9arK2WBEcHeDAPk44upleZDNg/edit?usp=sharing ---[ A little green bug has come to get squashed! Fuzzing like the Legendary Super Saiyan, by malweisse An introduction to fuzzers showing strengths and weakness of this approach in automatic bug detection. In particular we will dive into the usage and the internals of one of the most popular fuzzers of this time: American Fuzzy Lop. We will learn not only how to use it but also some useful strategies that can be applied to specified classes of programs to improve the performance of AFL. Slides link: https://docs.google.com/presentation/d/1CgsqmWMJhGdCHQfZVhA5hRD-240rcz_7nU5DZhXDL00/edit?usp=sharing