Training

Reversing Modern Binaries: Practical Rust & Go Analysis

trainer trainer

Nabih Benazzouz & Daniel Frederic

FuzzingLabs


Abstract

This 3-day training combines two comprehensive modules, focusing on reverse engineering Rust binaries and Golang binaries. Participants will gain hands-on experience with tools, techniques, and advanced malware analysis, concluding with a capstone project to reinforce their skills. Designed for malware analysts, reverse engineers, and security professionals, this course provides the knowledge needed to tackle real-world reverse engineering challenges in modern programming languages.

KEY LEARNING OBJECTIVES

  • Understand Rust & Go Fundamentals
  • Comprehend Rust & Go Compilation and Runtime
  • Analyze Rust & Go Structures and Control Flow
  • Utilize Tools for Rust & Go Reverse Engineering
  • Apply Advanced Reverse Engineering Techniques
  • Reverse Engineer Malware Techniques in Rust and Go

Trainer Info

trainer

Nabih is the COO of FuzzingLabs. Over the last 3½ years he’s moved from intern to security engineer, team lead, and now operations lead. His work focuses on fuzzing and vulnerability research, writing and maintaining tools in C, Python, Rust, and Go. He earned his cybersecurity-engineering degree from EPITA.

trainer

Daniel Frederic is a security researcher at Fuzzinglabs and the current head of the CTF team at LSE. Originally a kernel and low-level developer with a passion for reverse engineering, he merges these interests by focusing on low-level targets. His research primarily involves developing low-level fuzzing tools through in-depth exploration of often obscure targets.

Organizer

Organizer Logo

Partner Company

Partner Company Logo

Sponsors

POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.

Diamond

Party Sponsor

Gold

Supporting Friends

  • 0x41con
  • codeblue
  • kunlun
  • dailysecu
  • ekoparty
  • h2hc
  • hardweario
  • hexacon
  • hitcon
  • nopcon
  • nullcon
  • offensivecon
  • phdays
  • sincon
  • theori
  • xcon
  • zeronights