BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//2026//8Z3RAW
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-RD9TAK@cfp.nsec.io
DTSTART;TZID=EST:20260515T154500
DTEND;TZID=EST:20260515T161500
DESCRIPTION:Have you ever wondered how to run code inside a different proce
 ss? Or\, for that matter\, why you would WANT to run code in another proce
 ss?\n\nI originally entered the security world writing cheats for Windows 
 games - Starcraft\, Warcraft II\, and similar late-90s games. The tools ar
 e functionally lost to the ages\, but the techniques I used have served me
  for years: not only can you use process injection to cheat at video games
 \, it's useful for so much more: adding\, changing\, bypassing\, or even c
 alling code in a foreign process can help with fuzzing\, reverse engineeri
 ng\, malware detection\, and so much more!\n\nBut for a technique so commo
 nly used\, there isn't really a "standard" way to do it\, especially on Li
 nux!\n\nOne day\, I read a blog discussing how hard it was to do on Linux.
  I thought\, "that can't be right\, it's easy on Windows!" and set out to 
 prove them wrong. Days later\, I had accidentally written a debugger and l
 earned way\, way too much about the ptrace API and /proc filesystem!\n\nIn
  this talk\, I'll demonstrate the tooling I built and why it might be more
  useful than you might think to do this yourself!
DTSTAMP:20260507T203814Z
LOCATION:Ville-Marie
SUMMARY:Adventures in Process Injection (How I Accidentally Built a Debugge
 r - Again!) - Ron Bowes
URL:https://cfp.nsec.io/2026/talk/RD9TAK/
END:VEVENT
END:VCALENDAR
