Learn key concepts and methodologies to reverse a binary from a static and dynamic point of view
This training is dedicated to analysts who want to learn key concepts and methodologies and better understand or analyze faster, in a blackbox way, any code that can be found in the wild (malwares, applications, libraries, an exploit…). The training is focused on methodological aspects with all technical concepts that are needed to learn how to reverse a binary from a static and dynamic point of view. Practical exercises owns an important place in this training.
People who want to start with binary analysis on Intel platforms (e.g. malware analysts or application pentesters at large) Target OS are Linux and Windows but knowledge can easily be applied on any platform running on Intel IA-32 architecture.
5 days
Reverse engineering is hard to learn when fully beginning from scratch, some knowledges are needed as prerequisites to let the training focus on analysis methodology.
Some key skills that are needed:
A VirtualBox VM will be provided with all the tools required for the training.
Be able to:
Methodology is at the heart of the training to maximize the autonomy of attendees once the training is completed.
The whole training in divided into theoretical courses and practices (more than 50%), proportionally distributed inside each training day.
Exercises will be adapted according attendees group reverse engineering level which can vary from various reasons.
Some practical exercises:
Deobfuscation / protected binaries analysis including: – Binaries/functions rebuilding – Understand and bypass common obfuscation techniques