filmov
tv
Modifying a Binary Program Using C - Uri Sivan

Показать описание
Understanding and changing a binary program file without its source code does not always require dedicated reverse engineering tools. In this session we will use the tools we use every day - a C compiler and the GDB debugger - to explore and modify a commercial game binary. We will see how to read the memory of another process, how to debug a program without its source file, how to view and understand the assembly code just enough to change it, and how to automate the process. This session is not about learning a new skill, but showing what you can do with what you already know.
***
Uri Sivan is one of Cato's first engineers and is now a team lead. Over the years, he has worked at Cato on implementing IPSec, TCP congestion control algorithms, and an in house language for security rules. Prior to Cato, Uri worked mainly in C/C++ and focused on low level development and optimization of server software. With 20 years of software development experience, he is a real industry veteran.
***
Uri Sivan is one of Cato's first engineers and is now a team lead. Over the years, he has worked at Cato on implementing IPSec, TCP congestion control algorithms, and an in house language for security rules. Prior to Cato, Uri worked mainly in C/C++ and focused on low level development and optimization of server software. With 20 years of software development experience, he is a real industry veteran.