YoVDO

Using Binary Ninja for Modern Malware Analysis

Offered By: YouTube

Tags

Conference Talks Courses Reverse Engineering Courses Assembly Language Courses Malware Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore modern malware analysis techniques using Binary Ninja in this 30-minute conference talk from Derbycon 2016. Learn about Binary Ninja's interface, hotkeys, and features compared to IDA Pro. Discover how to leverage Control Flow Guard, navigate various interface views, and utilize auto-analysis capabilities. Gain insights into patching, modification, and understanding Intermediate Language (IL). Delve into Binary Ninja's architectures, plugins, and undo functionality. Watch a live demonstration of malware analysis implementation, including full script execution and step-by-step walkthrough. Enhance your reverse engineering skills with practical knowledge from industry experts Dr. Jared DeMott and Mr. Josh Stroschein.

Syllabus

Intro
Welcome
Who am I
Pluralsight
Binary Ninja
Todays Learning
Pricing
Interface
Hotkeys
Binary Ninja vs Ida
Control Flow Guard
Interface Views
Tabs
Log Output
Auto Analysis
Patching Modification
What is IL
Jump in assembly
Common questions
Binary Ninja Architectures
Binary Ninja Plugins
Binary Ninja Undo
Josh Stroschein
Demo
Implementation
Full Script
First Time Through
Previous Head
Demo Demo


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube