Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Introduction
00:00 • 4min
The SolarWinds Attack
04:29 • 3min
Are You Seeing More and More of These Malware Families?
07:58 • 2min
The Reasons for Using Go as an Attacking Language
09:53 • 4min
The Difference Between IDAPro and Go Language
13:37 • 5min
Go Reverse Engineering
18:41 • 2min
What Is Reverse Engineering?
20:17 • 2min
Go
22:17 • 1min
Idapro
23:46 • 2min
Reverse Engineering a Program
25:21 • 2min
Go - A New Way to Debug Java Programming
27:18 • 6min
Is Go a Good Language for Hackers?
32:51 • 2min
Is Rust a Good Programming Language?
34:45 • 3min
How to Deploy a Malware Detection Tool in an Infected Network
37:18 • 2min
Is Kasper's Key a Good Idea?
39:45 • 2min
Go Is a Memory Safe Language Unless I'm Mistaken
41:21 • 3min
Honeycomb - Find Your Most Perplexing Application Issues
44:29 • 2min
How to Reverse Engineer a C Programming Language?
46:46 • 2min
Reverse Engineering Go Programs With IDA Pro or GIDRA?
48:32 • 2min
The Basics of Reverse Engineering
50:51 • 3min
Ivan, What Is Your Unpopular Opinion?
54:20 • 2min
Do You Think the Google Play Store Is Safer Than the Apple Store?
56:28 • 3min
Is Cyberspace Never Going to Be Regulated?
59:56 • 3min
Hacking With Go - Part 3
01:02:46 • 2min