Writing a New Decompiler for JRuby Security Audits
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of security auditing for seldom-used technologies in this conference talk from the Hack In The Box Security Conference. Dive into the world of JRuby, a Java Virtual Machine language used by companies like Elastic, RedHat, and eazyBI. Learn how to navigate poorly documented software and turn black-box research into grey-box analysis. Discover the process of creating YBurj, a new free and open-source JRuby IR decompiler, which allows for automated recovery of compiled source code. Gain insights into vulnerabilities found during product audits using JRuby, and understand the challenges and rewards of choosing to explore unfamiliar technologies in security research. Follow along as the speaker, Dominic Couture, a staff security engineer at GitLab and bug bounty hunter, shares his experience in delving deep into the rabbit hole of JRuby and its Intermediate Representation (IR) format.
Syllabus
#HITB2023HKT D1T1 - Writing A New Decompiler Just For A Security Audit - Dominic Couture
Taught by
Hack In The Box Security Conference
Related Courses
Introduction to Reverse Engineering with GhidraHackaday via Independent Android Malware Analysis - From Zero to Hero
Udemy Reverse Engineering & Malware Analysis of .NET & Java
Udemy Reverse Engineering 5: Reversing Visual Basic
Udemy Securing Mobile App Secrets: Preventing Credential Leaks in Android Applications
Android Makers via YouTube