Windows Internals Workshop: Difference between revisions
No edit summary |
|||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
= Windows Internals workshop = | = Windows Internals workshop -- VIRTUAL = | ||
This workshop will be given:<br> | This workshop will be given:<br> | ||
Line 9: | Line 9: | ||
== Abstract == | == Abstract == | ||
NOTE: THIS IS A VIRTUAL WORKSHOP, but takes place live at A New HOPE<br> | |||
<br> | |||
Explore the structure of Windows executable files and the operating system itself, to better understand programs, services, malware, and defenses. Projects include: cheating at games, building malicious DLL libraries, stealing passwords from the API, building a keylogger, and debugging a driver. Tools used include pestudio, API Monitor, Visual Studio, OllyDbg, IDA Pro, Ghidra, and WinDbg. This workshop is structured as a CTF, so each participant can proceed at their own pace. The techniques will be briefly demonstrated, and we will provide tips and help as needed to make sure everyone is able to solve at least some of the challenges. No previous experience with Windows internals is required. | |||
== Presenter(s) == | == Presenter(s) == | ||
Sam Bowne<br> | |||
Elizabeth Biddlecome<br> | |||
Kaitlyn Handelman<br> | |||
Irvin Lemus | |||
Line 26: | Line 31: | ||
== Required Software == | == Required Software == | ||
any required software goes here | any required software goes here | ||
== What Participants Should Bring to the Workshop (if anything) == | |||
any optional or required stuff to bring go here | |||
== Links == | == Links == | ||
any links go here | any links go here |
Latest revision as of 16:33, 16 July 2022
Windows Internals workshop -- VIRTUAL
This workshop will be given:
Day 3: Sunday, 24-July-2022, 10:00am - 1:00pm, Workshop B (D'Angelo 306) -- VIRTUAL
NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop B (D'Angelo 306).
Abstract
NOTE: THIS IS A VIRTUAL WORKSHOP, but takes place live at A New HOPE
Explore the structure of Windows executable files and the operating system itself, to better understand programs, services, malware, and defenses. Projects include: cheating at games, building malicious DLL libraries, stealing passwords from the API, building a keylogger, and debugging a driver. Tools used include pestudio, API Monitor, Visual Studio, OllyDbg, IDA Pro, Ghidra, and WinDbg. This workshop is structured as a CTF, so each participant can proceed at their own pace. The techniques will be briefly demonstrated, and we will provide tips and help as needed to make sure everyone is able to solve at least some of the challenges. No previous experience with Windows internals is required.
Presenter(s)
Sam Bowne
Elizabeth Biddlecome
Kaitlyn Handelman
Irvin Lemus
Full Description
full description text goes here
Registration -- NOT required
You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:
Required Software
any required software goes here
What Participants Should Bring to the Workshop (if anything)
any optional or required stuff to bring go here
Links
any links go here