![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to reverse engineer Windows Defender's JavaScript engine, focusing on understanding its functionality, memory management, features, integration with the antivirus system, and more. Students will learn how to build tools to interact with the engine, identify non-security bugs, and explore anti-analysis techniques for malicious scripts. The teaching method involves a detailed analysis of the engine's components and attack surface, with insights on exploitation possibilities. This course is intended for security researchers, software engineers, and individuals interested in reverse engineering and cybersecurity.
Syllabus
Recon 2018 Brussels - Reverse Engineering Windows Defender’s JavaScript Engine
Taught by
Recon Conference