Toolbox for reverse engineering and binary exploitation

Back to the list of Speakers and Sessions

The objective of the workshop is to learn how to use some powerful but intimidating tools while reverse engineering IOT devices: Angr, Unicorn and Qiling.

The workshop aim to show common use cases for each of these tools and also their limits.

To that end, the workshop will propose the following exercices:

  • Decipher XOR encrypted strings with Angr
  • Automated buffer overflow exploitation with Angr
  • Emulation of arbitrary function or code blocks with Unicorn
  • Binary emulation with Qiling
  • Complete device emulation after firmware extraction with Renode