Reverse Engineering and Attacking .NET Applications

Presented at ToorCamp 2016, June 9, 2016, 3 p.m. (60 minutes).

This talk will demonstrate reverse engineering and attacking .NET applications. I will start by discussing reverse engineering as it pertains to .NET and show how to get a glimpse into a binaries code base. Moving forward I will show how to modify running applications with advanced .NET and assembly level attacks using open source tools I developed. By discussing internal framework structures you will leave understanding why and how these attacks work. You will also be able to implement defense and attack scenarios in test cases. You will leave with an overview of how to use reverse engineering to discover weaknesses in .NET applications and how to leverage those as an attacker.


Presenters:

  • Topher Timzen
    Topher Timzen has had a research emphasis on reverse engineering malware, incident response and exploit development. He has instructed college courses in malware analysis and memory forensics. Currently a Security Researcher at Intel Topher is working with the dark insides of hardware and has presented past research at DEF CON, BsidesPDX and SecTor.

Similar Presentations: