Laurie
Independent security researcher & reverse engineer, used to mod games, deeply interested in the inner workings of operating systems, currently focusing on building better (reverse engineering-related) tooling for the public.
Beitrag
Reverse engineering and mapping out the data structures of a complex piece of software is a tedious task.
What if you could visualize the data (as it lives in memory) as you define the structures in your source code, without leaving the comfort of your editor?
In this talk, I will both present a novel code-based memory viewer & hex-editor as well as outline the basics of reverse engineering unknown data structures - especially for people who haven't yet explored this area.
We will be walking through several real-world examples:
1. Reconstructing C++ structs from a proprietary file format.
2. Demonstrating the workflow of mapping out a data-structure in real-time
* .1 Demonstrating how to deal with changes in the data structure, e.g. when the program is updated.