SlideShare una empresa de Scribd logo

Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools

Source Conference
Source Conference
Source ConferenceEducator en Source Conference

Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools

1 de 43
Descargar para leer sin conexión
Reverse-Engineering Flash Files with SWFRETools,[object Object],Sebastian Porst (sp@porst.tv) – SOURCE Boston 2011,[object Object]
About Me,[object Object],2,[object Object]
Current Work,[object Object],3,[object Object]
What this talk is about,[object Object],Ship it!,[object Object],4,[object Object]
What this talk is not about,[object Object],5,[object Object]
Why is this relevant?,[object Object],6,[object Object]

Recomendados

Travis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBeeTravis Goodspeed - Not Quite ZigBee
Travis Goodspeed - Not Quite ZigBeeSource Conference
 
Reputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsReputation Digital Vaccine: Reinventing Internet Blacklists
Reputation Digital Vaccine: Reinventing Internet BlacklistsSource Conference
 
Yahoo BOSS Presentation London Open Hack Day Talk Boss
Yahoo BOSS Presentation London Open Hack Day Talk   BossYahoo BOSS Presentation London Open Hack Day Talk   Boss
Yahoo BOSS Presentation London Open Hack Day Talk BossKorben00
 

Más contenido relacionado

Destacado

YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentationYQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentationKorben00
 
Conférence Net Neutrality
Conférence Net NeutralityConférence Net Neutrality
Conférence Net NeutralityKorben00
 
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...Expolink
 
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...Positive Hack Days
 
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?Учебный центр "Эшелон"
 
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстовАвтоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстовd_olex
 
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективыБинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективыd_olex
 
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security RegulationsDavid Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security RegulationsSource Conference
 
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQubeНепрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQubeVasilii Chernov
 
Double Dog Dare
Double Dog Dare Double Dog Dare
Double Dog Dare halffast
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложенияхКонтроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложенияхjet_information_security
 

Destacado (13)

YQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentationYQL - Christian Heilmann Open Hack London presentation
YQL - Christian Heilmann Open Hack London presentation
 
Conférence Net Neutrality
Conférence Net NeutralityConférence Net Neutrality
Conférence Net Neutrality
 
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
Kaspersky endpoint security 8 для windows и kaspersky security center. лиценз...
 
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
Positive Hack Days. Олексюк. Автоматический поиск уязвимостей в программах бе...
 
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
Проведение сертификационных испытаний на отсутствие НДВ. Можно ли найти НДВ?
 
Автоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстовАвтоматический поиск уязвимостей в программах без исходных текстов
Автоматический поиск уязвимостей в программах без исходных текстов
 
Бинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективыБинарные уязвимости и эксплойты: технологии и перспективы
Бинарные уязвимости и эксплойты: технологии и перспективы
 
David Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security RegulationsDavid Snead - Nailing Down Security Regulations
David Snead - Nailing Down Security Regulations
 
Непрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQubeНепрерывный анализ качества кода с помощью SonarQube
Непрерывный анализ качества кода с помощью SonarQube
 
Double Dog Dare
Double Dog Dare Double Dog Dare
Double Dog Dare
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
Контроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложенияхКонтроль уязвимостей в программных приложениях
Контроль уязвимостей в программных приложениях
 

Similar a Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools

Non-Blocking Strategies for FFI
 Non-Blocking Strategies for FFI Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFIESUG
 
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5Ben Schmidtke III
 
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework ProjectRakuten Group, Inc.
 
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agileHow to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agileTobias Leisgang
 
Improving the Pharo VM
Improving the Pharo VMImproving the Pharo VM
Improving the Pharo VMFAST
 
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...Area41
 
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHPAm\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHPThe Software House
 
What is (not) Pharo 8?
What is (not) Pharo 8?What is (not) Pharo 8?
What is (not) Pharo 8?FAST
 
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint DevelopersVisual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developersosullish
 
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Kiran Jonnalagadda
 
Open source is for life, not just for Christmas
Open source is for life, not just for ChristmasOpen source is for life, not just for Christmas
Open source is for life, not just for ChristmasRichard Lord
 
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...Shane Coughlan
 
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source AutomationShane Coughlan
 
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...Apache Flink Taiwan User Group
 
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer John Riviello
 
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Luis Lopez
 
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PYPyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PYKir Chou
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierOSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierBasis Technology
 

Similar a Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools (20)

Non-Blocking Strategies for FFI
 Non-Blocking Strategies for FFI Non-Blocking Strategies for FFI
Non-Blocking Strategies for FFI
 
Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5Using FlexUnit 4 with Flash CS5
Using FlexUnit 4 with Flash CS5
 
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
[Rakuten TechConf2014] [E-4] Rakuten Front-end Framework Project
 
How to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agileHow to play basketball with a soccer team? - Make IC development more agile
How to play basketball with a soccer team? - Make IC development more agile
 
Improving the Pharo VM
Improving the Pharo VMImproving the Pharo VM
Improving the Pharo VM
 
Schizophrenic files
Schizophrenic filesSchizophrenic files
Schizophrenic files
 
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
Ange Albertini and Gynvael Coldwind: Schizophrenic Files – A file that thinks...
 
Am\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHPAm\I\Doing\It\Right? Struktura plików w PHP
Am\I\Doing\It\Right? Struktura plików w PHP
 
What is (not) Pharo 8?
What is (not) Pharo 8?What is (not) Pharo 8?
What is (not) Pharo 8?
 
Visual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint DevelopersVisual Studio 2010 for SharePoint Developers
Visual Studio 2010 for SharePoint Developers
 
Introduction to Plone (November 2003)
Introduction to Plone (November 2003)Introduction to Plone (November 2003)
Introduction to Plone (November 2003)
 
Open source is for life, not just for Christmas
Open source is for life, not just for ChristmasOpen source is for life, not just for Christmas
Open source is for life, not just for Christmas
 
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
OpenChain Webinar #58 - FOSS License Management through aliens4friends in Ecl...
 
“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation“State of the Tooling” in Open Source Automation
“State of the Tooling” in Open Source Automation
 
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
Apache Software Foundation: How To Contribute, with Apache Flink as Example (...
 
Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer Workshop: Introduction to Web Components & Polymer
Workshop: Introduction to Web Components & Polymer
 
Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.Developing rich multimedia applications with FI-WARE.
Developing rich multimedia applications with FI-WARE.
 
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PYPyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
 
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
FTC6 Jean-Emmanuel Rodriguez welcome Frogans Technology 6 2016/02/16
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierOSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
 

Más de Source Conference

From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationSource Conference
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best PracticesSource Conference
 

Más de Source Conference (20)

From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 
Everything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitationEverything you should already know about MS-SQL post-exploitation
Everything you should already know about MS-SQL post-exploitation
 
Keynote
KeynoteKeynote
Keynote
 
Threat Modeling: Best Practices
Threat Modeling: Best PracticesThreat Modeling: Best Practices
Threat Modeling: Best Practices
 

Último

Trending Topics for events Presentation.pdf
Trending Topics for events Presentation.pdfTrending Topics for events Presentation.pdf
Trending Topics for events Presentation.pdfgaju619
 
HPM Panther (Captan 50% WP) Presentation
HPM Panther (Captan 50% WP) PresentationHPM Panther (Captan 50% WP) Presentation
HPM Panther (Captan 50% WP) PresentationHpm India
 
BusinessWritingExamplesFeb2024Litt.pdf
BusinessWritingExamplesFeb2024Litt.pdfBusinessWritingExamplesFeb2024Litt.pdf
BusinessWritingExamplesFeb2024Litt.pdfSteven Litt
 
Cracking The Corporate Politics Code.pptx
Cracking The Corporate Politics Code.pptxCracking The Corporate Politics Code.pptx
Cracking The Corporate Politics Code.pptxWorkforce Group
 
Eni: fourth quarter and full year 2023 results
Eni: fourth quarter and full year 2023 resultsEni: fourth quarter and full year 2023 results
Eni: fourth quarter and full year 2023 resultsEni
 
Unocal 2023 Catalogue
Unocal 2023 CatalogueUnocal 2023 Catalogue
Unocal 2023 Catalogueqwipqwip
 
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst..."ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...Rachele Fleming
 
DBX Investor Presentation - Q4 and FY 2023
DBX Investor Presentation - Q4 and FY 2023DBX Investor Presentation - Q4 and FY 2023
DBX Investor Presentation - Q4 and FY 2023Dropbox
 
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdf
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdfMM Workshop Feb 2024 One Page Retirement Plan Simplified.pdf
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdfLogan Parks
 
How to generate FOMO for your next launch (in 4 steps).pptx
How to generate FOMO for your next launch (in 4 steps).pptxHow to generate FOMO for your next launch (in 4 steps).pptx
How to generate FOMO for your next launch (in 4 steps).pptxFOMO Creator
 
Business brief document explanation forward
Business brief document explanation forwardBusiness brief document explanation forward
Business brief document explanation forwardCJHaight
 
Unlock Your Potential: Entrepreneurship Tips with Majdouline Alouah
Unlock Your Potential: Entrepreneurship Tips with Majdouline AlouahUnlock Your Potential: Entrepreneurship Tips with Majdouline Alouah
Unlock Your Potential: Entrepreneurship Tips with Majdouline AlouahMajdouline Alouah
 
04 - The Greenhouse Effect.ppt.pptx
04 - The Greenhouse Effect.ppt.pptx04 - The Greenhouse Effect.ppt.pptx
04 - The Greenhouse Effect.ppt.pptxmmpnair0
 
Database Management.pdf
Database Management.pdfDatabase Management.pdf
Database Management.pdfBloomerang
 

Último (20)

Trending Topics for events Presentation.pdf
Trending Topics for events Presentation.pdfTrending Topics for events Presentation.pdf
Trending Topics for events Presentation.pdf
 
Pan Dhoni - Modernizing Data And Analytics using AI.pdf
Pan Dhoni - Modernizing Data And Analytics using AI.pdfPan Dhoni - Modernizing Data And Analytics using AI.pdf
Pan Dhoni - Modernizing Data And Analytics using AI.pdf
 
Charlie Caldwell - Living Smart with AI.pdf
Charlie Caldwell - Living Smart with AI.pdfCharlie Caldwell - Living Smart with AI.pdf
Charlie Caldwell - Living Smart with AI.pdf
 
Authentically Social by Corey Perlman (MyBOD)
Authentically Social by Corey Perlman (MyBOD)Authentically Social by Corey Perlman (MyBOD)
Authentically Social by Corey Perlman (MyBOD)
 
HPM Panther (Captan 50% WP) Presentation
HPM Panther (Captan 50% WP) PresentationHPM Panther (Captan 50% WP) Presentation
HPM Panther (Captan 50% WP) Presentation
 
BusinessWritingExamplesFeb2024Litt.pdf
BusinessWritingExamplesFeb2024Litt.pdfBusinessWritingExamplesFeb2024Litt.pdf
BusinessWritingExamplesFeb2024Litt.pdf
 
Cracking The Corporate Politics Code.pptx
Cracking The Corporate Politics Code.pptxCracking The Corporate Politics Code.pptx
Cracking The Corporate Politics Code.pptx
 
Eni: fourth quarter and full year 2023 results
Eni: fourth quarter and full year 2023 resultsEni: fourth quarter and full year 2023 results
Eni: fourth quarter and full year 2023 results
 
Unocal 2023 Catalogue
Unocal 2023 CatalogueUnocal 2023 Catalogue
Unocal 2023 Catalogue
 
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst..."ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...
"ZERO-COST PASSIVE INCOME MASTERY: THE 3-STEP SYSTEM" Same Proven 3-Step Syst...
 
Diamond Earrings
Diamond EarringsDiamond Earrings
Diamond Earrings
 
DBX Investor Presentation - Q4 and FY 2023
DBX Investor Presentation - Q4 and FY 2023DBX Investor Presentation - Q4 and FY 2023
DBX Investor Presentation - Q4 and FY 2023
 
Carol Scott - How to Thrive in the AI Era.pdf
Carol Scott - How to Thrive in the AI Era.pdfCarol Scott - How to Thrive in the AI Era.pdf
Carol Scott - How to Thrive in the AI Era.pdf
 
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdf
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdfMM Workshop Feb 2024 One Page Retirement Plan Simplified.pdf
MM Workshop Feb 2024 One Page Retirement Plan Simplified.pdf
 
5 Dr. Natalie Petouhoff_AI + Empathy.pdf
5 Dr. Natalie Petouhoff_AI + Empathy.pdf5 Dr. Natalie Petouhoff_AI + Empathy.pdf
5 Dr. Natalie Petouhoff_AI + Empathy.pdf
 
How to generate FOMO for your next launch (in 4 steps).pptx
How to generate FOMO for your next launch (in 4 steps).pptxHow to generate FOMO for your next launch (in 4 steps).pptx
How to generate FOMO for your next launch (in 4 steps).pptx
 
Business brief document explanation forward
Business brief document explanation forwardBusiness brief document explanation forward
Business brief document explanation forward
 
Unlock Your Potential: Entrepreneurship Tips with Majdouline Alouah
Unlock Your Potential: Entrepreneurship Tips with Majdouline AlouahUnlock Your Potential: Entrepreneurship Tips with Majdouline Alouah
Unlock Your Potential: Entrepreneurship Tips with Majdouline Alouah
 
04 - The Greenhouse Effect.ppt.pptx
04 - The Greenhouse Effect.ppt.pptx04 - The Greenhouse Effect.ppt.pptx
04 - The Greenhouse Effect.ppt.pptx
 
Database Management.pdf
Database Management.pdfDatabase Management.pdf
Database Management.pdf
 

Sebastian Porst - Reverse-Engineering Flash Files with SWFRETools

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.

Notas del editor

  1. http://www.flickr.com/photos/markchadwick/4592186576/
  2. http://www.flickr.com/photos/markchadwick/4592186576/