Description: This is the video of the presentation titled "<span style="font-weight: bold;">Reverse Engineering Dynamic Languages</span>, a Focus on Python" given by Aaron Portnoy and Ali Rizvi-Santiago at Recon 2008. <br><br>Every day more and more programmers are making the switch from traditional compiled languages such as C to more modern dynamic and interpreted languages such as Ruby and Python. We're seeing software ranging from video games to security tools written in these higher level languages and often released in binary form so as to protect the source. This talk focuses on Python with specific discussions revolving around extracting dynamic type information, disassembling code objects, and modifying runtime state statically. A real world complex example is demonstrated, hacking cheats into an MMORPG written in Python. This results in hilarious video demonstrations. <br><br>You can download a high resolution video here, the slides are available here. <br><br><br><style type="text/css">body { background: #FFF; } </style> </div>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.