Главная
Study mode:
on
1
Intro
2
The boring disclaimer
3
A few definitions
4
Why bother?
5
The sample
6
visual inspection
7
The checklist
8
Tools of the trade
9
disassembly, IDA Pro
10
Stage 2: disassembly, Ghidra
11
Stage 2: Structures!
12
Stage 2: Structures. This is the IDA way.
13
Stage 2: Structures. The Ghidra way.
14
Stage 2: Structures. The hard way.
15
Stage 2: Structures. The hard way, in Ghidra
16
Stage 2: Applying structures, IDA Pro
17
Stage 2: Fields of structures
18
Stage 2: Local types
19
Stage 2: Applying structures, Ghidra
20
Stage 2: Next pointer
21
Stage 2: Next steps
22
Stage 2: Where to next?
23
Now you make the tools
24
Stage 3: The task
25
Stage 3: IDA plugin
26
Stage 3: Ghidra script
27
Stage 3: Common parts
28
Stage 3: The data
29
Stage 3: Action!
30
Stage 3: The source code
31
Areas for development
Description:
Dive deep into the fundamentals of reverse engineering and static malware analysis in this comprehensive 52-minute conference talk by Igor Kuznetsov, Principal Security Researcher at Kaspersky. Explore essential concepts, tools, and techniques for static binary analysis, including visual inspection, disassembly using IDA Pro and Ghidra, working with structures, and applying local types. Learn how to develop custom tools, such as IDA plugins and Ghidra scripts, to enhance your analysis capabilities. Gain valuable insights into the practical aspects of reverse engineering, from initial sample examination to advanced automation techniques. Suitable for both beginners and experienced professionals in the fields of information security and network security, this talk provides a solid foundation for mastering the art of static binary analysis.

Static Binary Analysis - The Essentials

Kaspersky
Add to list
0:00 / 0:00