This week, we have the honor of hosting a presentation from Dan Bruce, a PhD student of CREST.
Dan will give a talk about the Radare 2, the tool all of you need if you want to work with binary files, as it is an open-source reverse engineering tool that can handle almost every binary file from every single architecture.
As the presentation will follow a demo format, feel free to download our Virtual Machine containing the tool (it is big so do it before the talk):
freedevelop.org/malware/KaliUCLNew.ova
The talk will be in GS01 in 66-72 Gower Street at 1pm.
Title:
Radare – A Tool For Reverse Engineering
Abstract:
r2 is a multiplatform opensource reverse engineering framework. The main tool of the framework is at its core a hexadecimal editor and debugger. It implements an advanced command line interface for moving around a file, analysing data, disassembling, binary patching, data comparison, searching, replacing, and visualising.
The tool was initially born out of necessity. A forensic analyst who wasn’t allowed to use private software wrote his own hexadecimal editor. This small project evolved into a complete framework for analysing binaries, making use of basic UNIX concepts: “everything is a file”, “small programs that interact using stdin/stdout”, and “keep it simple” paradigms. Starting as a 1 man project radare now has many active developers and contributors and even has a community gathering once a year (r2con)!
During this session we will look at the radare tool and see through demonstration how it can be used for reverse engineering.
URL:
https://www.radare.org/r/