YoVDO

Using Binary Ninja for Modern Malware Analysis

Offered By: YouTube

Tags

Conference Talks Courses Reverse Engineering Courses Assembly Language Courses Malware Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore modern malware analysis techniques using Binary Ninja in this 30-minute conference talk from Derbycon 2016. Learn about Binary Ninja's interface, hotkeys, and features compared to IDA Pro. Discover how to leverage Control Flow Guard, navigate various interface views, and utilize auto-analysis capabilities. Gain insights into patching, modification, and understanding Intermediate Language (IL). Delve into Binary Ninja's architectures, plugins, and undo functionality. Watch a live demonstration of malware analysis implementation, including full script execution and step-by-step walkthrough. Enhance your reverse engineering skills with practical knowledge from industry experts Dr. Jared DeMott and Mr. Josh Stroschein.

Syllabus

Intro
Welcome
Who am I
Pluralsight
Binary Ninja
Todays Learning
Pricing
Interface
Hotkeys
Binary Ninja vs Ida
Control Flow Guard
Interface Views
Tabs
Log Output
Auto Analysis
Patching Modification
What is IL
Jump in assembly
Common questions
Binary Ninja Architectures
Binary Ninja Plugins
Binary Ninja Undo
Josh Stroschein
Demo
Implementation
Full Script
First Time Through
Previous Head
Demo Demo


Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy