YoVDO

Malware Analysis and Automation using Binary Ninja

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Reverse Engineering Courses Malware Analysis Courses

Course Description

Overview

Explore malware analysis automation techniques using Binary Ninja in this 50-minute conference talk from Recon 2018 Montreal. Learn how to leverage the Binary Ninja platform to streamline analysis processes and adapt to evolving threats. Discover practical applications for automating configuration data extraction and decoding using real-world samples. Gain insights into the Binary Ninja interface, basic analysis techniques, and advanced API utilization. Benefit from the expertise of Erika Noerenberg, a senior threat researcher and malware reverse engineer, as she shares her experience in developing efficient automation solutions for complex malware analysis tasks.

Syllabus

Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube