Feeding Gophers to Ghidra
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore advanced techniques for analyzing Golang malware using Ghidra in this comprehensive conference talk. Learn how to navigate the complexities of Golang binaries without getting lost in unnecessary details. Discover a set of Java-based scripts developed to enhance Ghidra's capabilities in handling Golang executables, building upon Dorka Palotay's previous work. Delve into the intricacies of both Ghidra and Golang internals, and witness the significant improvements these scripts bring to the analysis process. Gain insights into recovering static and dynamic strings, functions with their original names, and Golang types. Understand the advantages of using Java for Ghidra scripting over the deprecated Python 2 approach. Watch a live demonstration of the scripts in action and learn how to apply them in your own malware research or vulnerability hunting endeavors. By the end of this talk, equip yourself with powerful tools and knowledge to effectively analyze Golang binaries encountered in your security work.
Syllabus
#HITB2023AMS #COMMSEC D2 - Feeding Gophers To Ghidra - Max Kersten
Taught by
Hack In The Box Security Conference
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy