Boston Cybernetics (@boscybernetics) 's Twitter Profile
Boston Cybernetics

@boscybernetics

Empowering People to Control Technology

ID: 900162779763666944

linkhttps://www.bostoncyber.org/ calendar_today23-08-2017 01:08:25

92 Tweet

546 Followers

1 Following

ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) 's Twitter Profile Photo

New to #Ghidra? Here's a detailed guide on Ghidra's primary components to help get you started with #reversing binaries. bit.ly/intro-ghidra Wanna dive deeper into Ghidra? Check out Jeremy Blackthorne & Evan Jensen interactive remote training at #Ringzer0 👏 bit.ly/ringzero-ghidra

New to #Ghidra?

Here's a detailed guide on Ghidra's primary components to help get you started with #reversing binaries. bit.ly/intro-ghidra

Wanna dive deeper into Ghidra?

Check out <a href="/0xJeremy/">Jeremy Blackthorne</a> &amp; <a href="/jensensec/">Evan Jensen</a> interactive remote training at #Ringzer0 👏 bit.ly/ringzero-ghidra
Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

CSC 2.0 Here are some tactics for the national strategy. It's time we start applying what we already know. DMs open. documentcloud.adobe.com/link/track?uri…

<a href="/CyberSolarium/">CSC 2.0</a> Here are some tactics for the national strategy. It's time we start applying what we already know. DMs open. documentcloud.adobe.com/link/track?uri…
Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

The communications and devices that surround you are controlled by code, which was written by others. This is the new nature and we're all in it. You can be predator, you can be prey. eventbrite.com/e/vulnerabilit… Boston Cybernetics

Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

.Boston Cybernetics is always trying to improve student efficiency. Here's a sample from our embedded class: a Jupyter Notebook attached to a remote Python kernel in IDA Pro to debug a MIPS binary with QEMU. We'll post the config and instructions to Github. Ilfak Guilfanov

Boston Cybernetics (@boscybernetics) 's Twitter Profile Photo

Ever wanted to know how all those little gadgets work? How about how to hijack control of them? Train with us remotely at Infiltrate this October to learn reversing and exploitation on Linux and ARM. infiltratecon.com/conference/tra…

Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

Ian is an expert in armchairs "Is it secure?" Always a fascinating question. Here's a high-level explanation and a more thorough discussion: Calculus of Cybersecurity: documentcloud.adobe.com/link/track?uri… Cyber Survivability Assessments: documentcloud.adobe.com/link/track?uri…

Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

.Boston Cybernetics teamed up with Senior Cyber Engineer, Allison Rancourt, from MITRE, currently teaching a great workshop for women in computer science. Software cracks and smashing stacks.

.<a href="/BosCybernetics/">Boston Cybernetics</a> teamed up with Senior Cyber Engineer, Allison Rancourt, from <a href="/MITREcorp/">MITRE</a>, currently teaching a great workshop for women in computer science. Software cracks and smashing stacks.
Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

Recorded video using Ghidra, Jupyter, and GDB to leak a stack canary, one lesson from the upcoming Modern Binary Exploitation, Jan 23 - 29 at ringzerø.training && @[email protected]. Details here: ringzer0.training/modern-binary-…. Video: youtu.be/Xt3eWaplMd0. Also my first YouTube upload, so thank god that's over.

Jeremy Blackthorne (@0xjeremy) 's Twitter Profile Photo

Use preeny to start a suspended process, allowing a debugger to attach even when there's no natural breakpoints and use Jupyter with pwntools as an execution harness. Learn other useful techniques like these in Modern Binary Exploitation ringzer0.training/modern-binary-… ringzerø.training && @[email protected] [email protected]

MA (@astrokryptech) 's Twitter Profile Photo

What a week! I attended the Introduction to Reverse Engineering Class from Boston Cybernetics Institute Boston Cybernetics 😍 one of the sponsors of Day of Shecurity 😁 helping to get more #WomenInSTEM ! #infosec #cybersecurity #reverseengineering This is GOLD 🏆 RT for reach 🔥

PiranhaMama (@rozhkovacsia) 's Twitter Profile Photo

I spent the most amazing week with smart women in Intro to Reverse Engineering sponsored by Boston Cybernetics and Day of Shecurity! Thanks to Jeremy Blackthorne for teaching such an awesome class! Learned new ways to break code! #codehegehogs

casey (@varcharr) 's Twitter Profile Photo

@ women in tech Are you interested in binary reversing and exploitation? This is a FREE introductory class being offered March 7-March 11 by Boston Cybernetics. DM for pw. eventbrite.com/e/binary-rever…

PiranhaMama (@rozhkovacsia) 's Twitter Profile Photo

Thanks to Boston Cybernetics and Day of Shecurity for a great class, Binary Reversing and Exploitation Course! Kayla0x41 is an amazing instructor! #womenincybersecurity #womenwhoreverse #reverseengineering

Boston Cybernetics (@boscybernetics) 's Twitter Profile Photo

We're running our second only public Ghidra course! This coming February, tickets available now. #Ghidra #reversing #reverseengineering eventbrite.com/e/483089011237

REcon (@reconmtl) 's Twitter Profile Photo

Come to REcon 2023 in Montreal and learn Reversing With GHIDRA with Jeremy Blackthorne recon.cx/2023/trainingr… #ghidra #recon2023 #CyberSecurity

Come to REcon 2023 in Montreal and learn Reversing With GHIDRA with <a href="/0xJeremy/">Jeremy Blackthorne</a> recon.cx/2023/trainingr…   #ghidra #recon2023 #CyberSecurity
REcon (@reconmtl) 's Twitter Profile Photo

Come to REcon 2023 in Montreal and learn about Automated Analysis With GHIDRA with Kayla Afanador recon.cx/2023/trainingA… #ghidra #CyberSecurtiy #recon2023

Come to REcon 2023 in Montreal and learn about Automated Analysis With GHIDRA with Kayla Afanador   recon.cx/2023/trainingA… #ghidra #CyberSecurtiy #recon2023