Reversing GO Binaries With Ghidra
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the intricacies of reversing Golang binaries using Ghidra in this conference talk from the Hack In The Box Security Conference. Delve into the world of IoT malware written in Go, understanding its growing prevalence and the challenges it presents to reverse engineers. Learn about the unique features of Go binaries that complicate analysis, such as static linking and debug information retention. Discover custom Ghidra scripts developed to automate and streamline the reverse engineering process. Examine recent trends in Golang obfuscation techniques and the emergence of Linux crypters like Ezuri. Gain insights from experienced malware researchers Albert Zsigovits and Dorka Palotay as they share their expertise on tackling common problems in Go malware analysis and provide practical tools for more effective threat detection and mitigation.
Syllabus
#HITBCW2021 D1 - Reversing GO Binaries With Ghidra - Albert Zsigovits and Dorka Palotay
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube