Binaries are black boxes. They don’t tell you what they’re doing inside, and they certainly don’t let you change it. Unless you cheat: dynamic instrumentation lets you reach into a running process and mess with it while it’s executing.
This workshop is about Frida, a toolkit that lets you hook into function calls, read their arguments, and swap out return values, all from a JavaScript REPL. We’ll start by poking at binaries with the classics, strace, ltrace, strings and then move on to writing Frida scripts that actually change how programs behave at runtime.
You’ll practice on intentionally simple binaries: bypass a password check, cheat at a score counter, disable anti-debugging. That kind of thing.
Why would you care about any of this?
- You want to understand what some binary actually does
- You need logging in production code but can’t recompile it
- You want to simulate ugly failure conditions without touching your source
- You’re curious what your own software looks like from the other side
No reverse engineering background needed, just some comfort with the terminal and a rough idea of what C looks like. Bring a laptop with GNU+Linux if you want to follow along.
What:
When: Dienstag, 14. April 2026, 19:00
Where: XORTEX LBS3, FH3
Who: Felix Eberstaller
Ergänzende Infos und Updates wie immer auf https://fhLUG.at!
