YoVDO

Writing a New Decompiler for JRuby Security Audits

Offered By: Hack In The Box Security Conference via YouTube

Tags

Reverse Engineering Courses Decompilation Courses Bug Hunting Courses Vulnerability Research Courses JRuby Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of security auditing for seldom-used technologies in this conference talk from the Hack In The Box Security Conference. Dive into the world of JRuby, a Java Virtual Machine language used by companies like Elastic, RedHat, and eazyBI. Learn how to navigate poorly documented software and turn black-box research into grey-box analysis. Discover the process of creating YBurj, a new free and open-source JRuby IR decompiler, which allows for automated recovery of compiled source code. Gain insights into vulnerabilities found during product audits using JRuby, and understand the challenges and rewards of choosing to explore unfamiliar technologies in security research. Follow along as the speaker, Dominic Couture, a staff security engineer at GitLab and bug bounty hunter, shares his experience in delving deep into the rabbit hole of JRuby and its Intermediate Representation (IR) format.

Syllabus

#HITB2023HKT D1T1 - Writing A New Decompiler Just For A Security Audit - Dominic Couture


Taught by

Hack In The Box Security Conference

Related Courses

Introduction to Reverse Engineering with Ghidra
Hackaday via Independent
Android Malware Analysis - From Zero to Hero
Udemy
Reverse Engineering & Malware Analysis of .NET & Java
Udemy
Reverse Engineering 5: Reversing Visual Basic
Udemy
Securing Mobile App Secrets: Preventing Credential Leaks in Android Applications
Android Makers via YouTube