My remote reverse engineering training at @ringzer0 starts in just a month! If you want to learn binary analysis from scratch, master tools like Ghidra & IDA, recover data structures & C++ classes and examine nation-state malware, this is your chance.
🔍 Beginner-Friendly Reverse Engineering Training – Starts February 10th!
In the week of February 10-17, I'll give a remote, beginner-friendly reverse engineering course in cooperation with @ringzer0 This online class is a comprehensive journey into binary program analysis, starting from the absolute basics of reverse engineering, progressing through data type reconstruction, and extending to C++ reverse engineering, malware analysis, and automation techniques.
Key Learning Objectives:
🚀 From Basics to Advanced: Learn reversing from scratch and understand the layers between machine code and high-level languages.
🛠️ Tool Mastery: Become proficient in using IDA, Ghidra, and GDB.
🧩 Code/Data Reconstruction: Learn to reconstruct complex code and data structures from machine code, up to reconstructing C++ class hierarchies.
🕵️ Malware Analysis: Gain strategies for analyzing complex binaries, such as nation-state malware samples.
✋ Hands-On Experience: Practical sessions to strengthen your reverse engineering skills.
Who Should Attend?
Ideal for cybersecurity experts, malware analysts, and forensic specialists looking to delve into reverse engineering and low-level program analysis.
Thanks to Nicolò Altamura, the new version of my #binaryninja plugin "obfuscation_detection" includes a heuristic to detect arithmetically complex expressions. This allows pinpointing arithmetic obfuscation and cryptography in binaries.
🎉 I am honored to be presenting at the #SwissCyberStorm conference on October 24, 2023! 🎉
🔍 Talk Title: "Unveiling Malicious Behavior in Unknown Binaries"
In this presentation, we will:
🔑 Dive deep into strategies for extracting malicious behaviors in unknown binaries.
🛡 Cover tactics from fundamental signature-based checks, string analysis, and packer detection to advanced heuristics.
🌐 Discuss identifying Command and Control (C2) communication and decryption routines in malware.
🚀 With the rise of sophisticated malware, traditional strategies often fall short. We will introduce advanced techniques and heuristics to navigate and analyze complex binary files.