{"id":1017,"date":"2021-11-07T18:05:30","date_gmt":"2021-11-08T00:05:30","guid":{"rendered":"https:\/\/dc612.org\/?p=1017"},"modified":"2021-11-07T18:05:30","modified_gmt":"2021-11-08T00:05:30","slug":"thursday-november-11th-612pm-virtual","status":"publish","type":"post","link":"https:\/\/dc612.org\/index.php\/2021\/11\/07\/thursday-november-11th-612pm-virtual\/","title":{"rendered":"Thursday, November 11th \u2013 6:12pm @ Virtual"},"content":{"rendered":"\n<p>This month we have a special guest from our neighbors over at 613, who is here to talk about getting into Reverse Engineering!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM-1024x580.png\" alt=\"\" class=\"wp-image-1018\" srcset=\"https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM-1024x580.png 1024w, https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM-300x170.png 300w, https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM-768x435.png 768w, https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM-1536x870.png 1536w, https:\/\/dc612.org\/wp-content\/uploads\/2021\/11\/Screen-Shot-2021-11-07-at-5.57.52-PM.png 1550w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><meta charset=\"utf-8\"><p>All Software is Open Source: An Introduction to Reverse Engineering<\/p><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><\/p><cite>Commercial software is full of dark secrets &#8211; embedded keys and passwords, hidden backdoors, security vulnerabilities\u2026 But with companies guarding proprietary source code, is there any hope of discovering and rectifying them?<br><br>Enter Reverse Engineering. With its powerful tools and techniques, you can analyze any closed-source software, and have fun doing it!<\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Dmitriy Beryoza<\/h2>\n\n\n\n<p>He\/Him &#8211; Senior Security Researcher &#8211; Vectra AI<br>Dmitriy is a Senior Security Researcher at Vectra AI. Before that he was a pentester and secure software development advocate at IBM. He spent over 25 years of his life building software before realizing that breaking it is much more fun. Dmitriy is passionate about all things security, with particular interest in reverse engineering, binary exploitation, secure software development, and CTF competitions.<\/p>\n\n\n\n<p>As usual these days of Covid, we will be meeting online at\u00a0<a href=\"https:\/\/cafe.cyberia.club\/dc612\">https:\/\/cafe.cyberia.club\/dc612<\/a>.<\/p>\n\n\n\n<p>-kat<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month we have a special guest from our neighbors over at 613, who is here to talk about getting into Reverse Engineering! All Software is Open Source: An Introduction to Reverse Engineering Commercial software is full of dark secrets &#8211; embedded keys and passwords, hidden backdoors, security vulnerabilities\u2026 But with companies guarding proprietary source [&hellip;]<\/p>\n","protected":false},"author":2330,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1017","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/1017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/users\/2330"}],"replies":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/comments?post=1017"}],"version-history":[{"count":3,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/1017\/revisions"}],"predecessor-version":[{"id":1021,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/1017\/revisions\/1021"}],"wp:attachment":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/media?parent=1017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/categories?post=1017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/tags?post=1017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}