Qiling Framework - Build a Fuzzer Based on a 1day Bug
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Dive into the world of advanced binary analysis with this comprehensive virtual lab on the Qiling Framework. Learn how to build a fuzzer based on a 1day bug from Lau Kai Jern, Lab Director of The ShepherdLab at JD Security. Explore the installation process, fundamentals, and practical applications of Qiling Framework, a powerful sandbox emulator with extensive Python API capabilities. Discover how to analyze executables across different platforms and architectures, including Windows PE files on Linux Arm64 and IoT firmware on MacOS. Gain insights into developing customized analysis tools and techniques for uncovering potential 0day vulnerabilities. This hands-on lab, presented at the Hack In The Box Security Conference, offers a unique opportunity to enhance your skills in automated binary analysis, reverse engineering, and advanced security research.
Syllabus
#HITBLockdown002 VIRTUAL LAB: Qiling Framework: Build a Fuzzer Based on a 1day Bug - Lau Kai Jern
Taught by
Hack In The Box Security Conference
Related Courses
Threat Hunting with YaraPluralsight Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube Debin: Predicting Debug Information in Stripped Binaries
Association for Computing Machinery (ACM) via YouTube