#1
|
|||
|
|||
RECON 2017 (Montreal) SLIDES (and other ARCHIVED slides)
SLIDES from Recon 2017 (Montreal) :
Get them HERE . Quote:
ALL ARCHIVES of RECON (SLIDES, VIDEOS etc) : Link here . |
The Following User Gave Reputation+1 to TechLord For This Useful Post: | ||
niculaita (07-21-2017) |
#2
|
|||
|
|||
The slides of Recon Montreal 2017 are still missing in the archive. However, they are linked here:
https://recon.cx/2017/montreal/slides/ edit: oh, I missed it. sorry for that! Last edited by t3xc0d3; 07-22-2017 at 16:12. |
#3
|
|||
|
|||
Quote:
It's right under the title. They are NOT missing in my first post above It contains the links to the slides for 2017 ! |
#4
|
|||
|
|||
Bochspwn Reloaded: Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking - Mateusz “j00ru” Jurczyk
recommended |
#5
|
||||
|
||||
Quote:
|
The Following User Says Thank You to deepzero For This Useful Post: | ||
tonyweb (08-27-2017) |
#6
|
|||
|
|||
from j00ru blog
"We decided to use Bochs because it is by far easier to write instrumentation for, i.e. it has a very intuitive and simple instrumentation API, documentation and examples you can use to cleanly and elegantly implement the desired logic. As far as we are concerned, hacking on qemu is much more difficult because of lacking instrumentation support and horribly written code." Last edited by sh3dow; 08-27-2017 at 02:19. |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Black Hat USA 2017 | TechLord | General Discussion | 4 | 08-31-2017 12:48 |
Black Hat Asia 2017 | TechLord | General Discussion | 0 | 04-01-2017 07:53 |
Happy New Year 2017 | Zipdecode | General Discussion | 44 | 03-14-2017 19:38 |