SSE Seminar – 14th November 2018 1pm, GS01 in 66-72 Gower Street

This week, we have the honor of hosting a presentation from Dan Bruce, a PhD student of CREST.

Dan will give a talk about the Radare 2, the tool all of you need if you want to work with binary files, as it is an open-source reverse engineering tool that can handle almost every binary file from every single architecture.

As the presentation will follow a demo format, feel free to download our Virtual Machine containing the tool (it is big so do it before the talk):

freedevelop.org/malware/KaliUCLNew.ova

The talk will be in GS01 in 66-72 Gower Street at 1pm.

Title:
Radare – A Tool For Reverse Engineering

Abstract:
r2 is a multiplatform opensource reverse engineering framework. The main tool of the framework is at its core a hexadecimal editor and debugger. It implements an advanced command line interface for moving around a file, analysing data, disassembling, binary patching, data comparison, searching, replacing, and visualising.

The tool was initially born out of necessity. A forensic analyst who wasn’t allowed to use private software wrote his own hexadecimal editor. This small project evolved into a complete framework for analysing binaries, making use of basic UNIX concepts: “everything is a file”, “small programs that interact using stdin/stdout”, and “keep it simple” paradigms. Starting as a 1 man project radare now has many active developers and contributors and even has a community gathering once a year (r2con)!

During this session we will look at the radare tool and see through demonstration how it can be used for reverse engineering.

URL:
https://www.radare.org/r/