YoVDO

fn_fuzzy - Fast Multiple Binary Diffing Triage With IDA

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Reverse Engineering Courses Malware Analysis Courses IDA Pro Courses

Course Description

Overview

Explore an innovative approach to fast multiple binary diffing triage using IDA Pro in this conference talk from the Hack In The Box Security Conference. Learn about fn_fuzzy, a tool designed to quickly identify similar and previously analyzed IDB files for malware reverse engineers. Discover how this light-weight binary diffing tool calculates two types of fuzzy hashes for each function in IDBs: ssdeep hash values of code bytes and Machoc hash values of call flow graphs. Understand the advantages of fn_fuzzy over other binary diffing tools like BinDiff, Diaphora, and Kam1n0 in terms of speed and efficiency. Gain insights into how this tool can significantly improve the workflow of experienced reverse engineers dealing with hundreds or thousands of IDBs, allowing them to focus on new functions and import findings from previously analyzed databases more effectively.

Syllabus

#HITB2019AMS D1T2 - fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama


Taught by

Hack In The Box Security Conference

Related Courses

Malware Analysis: Identifying and Defeating Packing
Pluralsight
Malware Analysis: Identifying and Defeating Code Obfuscation
Pluralsight
Getting Started with Reverse Engineering
Pluralsight
Reverse Engineering: IDA For Beginners
Udemy
Malware Analysis and Reverse Engineering Course
YouTube