mr_phrazer

@mr_phrazer@infosec.exchange

This profile is from a federated server and may be incomplete. Browse more on the original instance.

mr_phrazer, to random

My remote reverse engineering training at @ringzer0 starts in just a month! If you want to learn binary analysis from scratch, master tools like Ghidra & IDA, recover data structures & C++ classes and examine nation-state malware, this is your chance.

https://ringzer0.training/trainings/reverse-engineering-binary-program-analysis.html

mr_phrazer, to ReverseEngineering

🔍 Beginner-Friendly Reverse Engineering Training – Starts February 10th!

In the week of February 10-17, I'll give a remote, beginner-friendly reverse engineering course in cooperation with @ringzer0 This online class is a comprehensive journey into binary program analysis, starting from the absolute basics of reverse engineering, progressing through data type reconstruction, and extending to C++ reverse engineering, malware analysis, and automation techniques.

Key Learning Objectives:

🚀 From Basics to Advanced: Learn reversing from scratch and understand the layers between machine code and high-level languages.

🛠️ Tool Mastery: Become proficient in using IDA, Ghidra, and GDB.

🧩 Code/Data Reconstruction: Learn to reconstruct complex code and data structures from machine code, up to reconstructing C++ class hierarchies.

🕵️ Malware Analysis: Gain strategies for analyzing complex binaries, such as nation-state malware samples.

✋ Hands-On Experience: Practical sessions to strengthen your reverse engineering skills.

Who Should Attend?

Ideal for cybersecurity experts, malware analysts, and forensic specialists looking to delve into reverse engineering and low-level program analysis.

📧 Register: https://ringzer0.training/trainings/reverse-engineering-binary-program-analysis.html

#reverseengineering #malwareanalysis #malware #cybersecuritytraining #binarysecurity #BOOTSTRAP24

mr_phrazer, to ReverseEngineering

Thanks to Nicolò Altamura, the new version of my plugin "obfuscation_detection" includes a heuristic to detect arithmetically complex expressions. This allows pinpointing arithmetic obfuscation and cryptography in binaries.

Plugin: https://github.com/mrphrazer/obfuscation_detection

mr_phrazer, to Cybersecurity

🎉 I am honored to be presenting at the conference on October 24, 2023! 🎉

🔍 Talk Title: "Unveiling Malicious Behavior in Unknown Binaries"

In this presentation, we will:

🔑 Dive deep into strategies for extracting malicious behaviors in unknown binaries.

🛡 Cover tactics from fundamental signature-based checks, string analysis, and packer detection to advanced heuristics.

🌐 Discuss identifying Command and Control (C2) communication and decryption routines in malware.

🚀 With the rise of sophisticated malware, traditional strategies often fall short. We will introduce advanced techniques and heuristics to navigate and analyze complex binary files.

📌 For more details and to register, visit: https://lnkd.in/eTMvGrhi

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines