Using Binary Ninja for Modern Malware Analysis
Offered By: YouTube
Course Description
Overview
Explore modern malware analysis techniques using Binary Ninja in this 30-minute conference talk from Derbycon 2016. Learn about Binary Ninja's interface, hotkeys, and features compared to IDA Pro. Discover how to leverage Control Flow Guard, navigate various interface views, and utilize auto-analysis capabilities. Gain insights into patching, modification, and understanding Intermediate Language (IL). Delve into Binary Ninja's architectures, plugins, and undo functionality. Watch a live demonstration of malware analysis implementation, including full script execution and step-by-step walkthrough. Enhance your reverse engineering skills with practical knowledge from industry experts Dr. Jared DeMott and Mr. Josh Stroschein.
Syllabus
Intro
Welcome
Who am I
Pluralsight
Binary Ninja
Todays Learning
Pricing
Interface
Hotkeys
Binary Ninja vs Ida
Control Flow Guard
Interface Views
Tabs
Log Output
Auto Analysis
Patching Modification
What is IL
Jump in assembly
Common questions
Binary Ninja Architectures
Binary Ninja Plugins
Binary Ninja Undo
Josh Stroschein
Demo
Implementation
Full Script
First Time Through
Previous Head
Demo Demo
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube