diff --git a/content/meetings/fa2023/2023-10-05/index.md b/content/meetings/fa2023/2023-10-05/index.md new file mode 100644 index 000000000..d3d45be79 --- /dev/null +++ b/content/meetings/fa2023/2023-10-05/index.md @@ -0,0 +1,20 @@ +--- +title: Reverse Engineering II +time_start: 2023-10-06T00:00:00.000Z +time_close: "" +week_number: 6 +credit: + - Richard Liu +featured: true +location: Siebel CS 1404 +live_video_url: https://illinois.zoom.us/j/84469194430?pwd=d1dNOEZ0MXpmOEZwS3lOTzZQOStXdz09 +tags: + - rev + - x86-64 + - ghidra +--- +## Summary + +We will discuss reverse engineering for compiled binaries! We will show how to "decompile" an x86 binary into readable code using Ghidra and other tools. + +Before this meeting, we highly recommend setting up your laptop with tools for reversing (see our [reverse engineering setup meeting](https://sigpwny.com/meetings/fa2023/2023-09-17/)) and checking out our previous reverse engineering meetings ([x86-64 assembly](https://sigpwny.com/meetings/fa2023/2023-10-01/) and [Reverse Engineering I](https://sigpwny.com/meetings/fa2023/2023-09-21/)). \ No newline at end of file