3 private links
Reverse Engineering Cognition
September 2015
Topics: Cybersecurity, Technical Training
Maura K. Tennor, The MITRE Corporation
This paper presents the results of a literature review on the topic of Reverse Engineering Cognition under MITRE’s Internal Research and Development Portfolio. Resource material for this review was gathered by conducting a series of searches for journal articles, conference proceedings and a variety of Internet sources. The paper summarizes what we know today about how reverse engineering of binaries is performed at a cognitive and mechanical level, ties in related areas such as expertise and mental models, and suggests avenues for future research.
In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.
All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community.
We highly encourage people who already know these topic areas to take the provided material and pursue paid and unpaid teaching opportunities.
Those who can, teach.
MI-LXC : Mini-Internet using LXC
MI-LXC uses LXC to simulate a small-scale internet-like environment. I use this environment for (infosec) practical work (intrusion, firewall, IDS, etc.). The small memory footprint of LXC combined with differential images allows to run it on modest hardware.
It is based on the infrastructure-as-code principle: these scripts programmatically generate the target environment.
Example practical work using this environment (in french) :
Intrusion scenario
Firewall
IDS