Reverse Engineering of Black Box Binaries with Symbolic and Concolic Execution Technique
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore advanced reverse engineering techniques in this 30-minute conference talk from Recon2022. Learn how to tackle complex binaries with large control-flow graphs using symbolic and concolic execution. Discover the power of symbolic execution for matching binary states with corresponding inputs, and apply these methods to crackme solving, deobfuscation, and advanced fuzzing. Gain hands-on experience with the angr framework, identifying and resolving common issues. Follow along as speaker Jannis Kirschner, a Swiss Vulnerability Researcher and CTF player, demonstrates how to speed up the reverse engineering process using SMT solving and symbolic execution. By the end of this talk, approach intimidating control-flow graphs with confidence, knowing when and how to leverage symbolic execution for CTF challenges and vulnerability research.
Syllabus
Recon2022 - Reverse engineering of black box binaries with symbolic and concolic execution technique
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube