Important announcement for users Learn more
The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
Get help you needPenetration Testing Services
Trainings
The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
Get help you needThe SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
Get help you needThe SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats.
In episode 5 of Season 2, Marco interviews Pedram Amini, a world renowned expert in fuzzing and hacking. Pedram has presented a variety of research at different conferences such as BlackHat, DefCon, Microsoft Bluehat, and Virus Bulletin to name a few. He’s also taught numerous sold-out courses on reverse engineering.
In this episode, Marco and Pedram dive deep into finding bugs, fuzzing and how Pedram started ZDI. Pedram takes us through the mindset of bootstrapping companies and what it takes to make them successful.
“From a young age, I’ve always been into puzzles, you know, and at some point I had gotten my hands on a laptop in the early years in high school. And as a matter of necessity, just to get access to the software, I picked up a copy of Soft Ice and I started cracking protection codes. And I found that that process actually of reverse engineering to crack those codes was more fun than any puzzles I’ve ever done. And so really, the debugger and the compiler are the last puzzle I ever picked up.”
“From a young age, I’ve always been into puzzles, you know, and at some point I had gotten my hands on a laptop in the early years in high school. And as a matter of necessity, just to get access to the software, I picked up a copy of Soft Ice and I started cracking protection codes. And I found that that process actually of reverse engineering to crack those codes was more fun than any puzzles I’ve ever done. And so really, the debugger and the compiler are the last puzzle I ever picked up.”
“From a young age, I’ve always been into puzzles, you know, and at some point I had gotten my hands on a laptop in the early years in high school. And as a matter of necessity, just to get access to the software, I picked up a copy of Soft Ice and I started cracking protection codes. And I found that that process actually of reverse engineering to crack those codes was more fun than any puzzles I’ve ever done. And so really, the debugger and the compiler are the last puzzle I ever picked up.”
“From a young age, I’ve always been into puzzles, you know, and at some point I had gotten my hands on a laptop in the early years in high school. And as a matter of necessity, just to get access to the software, I picked up a copy of Soft Ice and I started cracking protection codes. And I found that that process actually of reverse engineering to crack those codes was more fun than any puzzles I’ve ever done. And so really, the debugger and the compiler are the last puzzle I ever picked up.”
“From a young age, I’ve always been into puzzles, you know, and at some point I had gotten my hands on a laptop in the early years in high school. And as a matter of necessity, just to get access to the software, I picked up a copy of Soft Ice and I started cracking protection codes. And I found that that process actually of reverse engineering to crack those codes was more fun than any puzzles I’ve ever done. And so really, the debugger and the compiler are the last puzzle I ever picked up.”
Today’s cyber attackers move fast. Fast enough that 1-10-60 has become an obsolete model for effective detection
August 8, 2022
S02 E05: Prepare to Meet Pedram Amini In episode 5 of Season 2, Marco interviews Pedram Amini, a world renowned […]
August 8, 2022