Description: <div style="text-align: justify;">This is the video of the presentation titled "<span style="font-weight: bold;">RE:Trace Applied Reverse Engineering on OS X</span>" given by Tiller Beauchamp at Recon 2008. The presentation slides can be downloaded here. The demo movies for heap, stack and hids are also available. <br><br><span style="font-style: italic;">Talk Outline:</span> This paper will detail the newest developments in RE:Trace, a reverse engineering framework based on Ruby and DTrace. We will discuss implementations for walking and searching the heap on OS X, tracing for kernel and driver vulnerabilities, pinpointing format string bugs and leveraging custom application probes, such as those built into browser and database software.<br>Material<br><br><br><span style="font-style: italic;">Speaker Bio:</span> Tiller Beauchamp works as a senior security consultant for SAIC providing security auditing services to large commercial, state and DoD customers. His areas of expertise include network penetration testing, web application security, IPv6 and exploit development. Beauchamp earned his M.S. in Computer Science from the University of Oregon with a specialization in software engineering. He has worked as the lead developer for Team Defend, SAIC's portable computer and network defense exercise. Beauchamp is also responsible for maintaining the company's penetration toolkit and penlab. <br><br><br><br></div><br> <style type="text/css"> body { background: #FFF; } </style>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.