A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Using Binary Ninja for Modern Malware Analysis - Dr. Jared DeMott & Mr. Josh Stroschein Derbycon 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Using Binary Ninja for Modern Malware Analysis
Dr. Jared DeMott & Mr. Josh Stroschein
Derbycon 2016

After a quick intro and outline we jump into an exciting talk about how to do advanced malware analysis on modern samples. On top of that, we introduce a new reverse engineering tool: Binary Ninja. Typically, IDA pro rules the roost. But IDA is too expensive for most mortals. It's time for a new tool to take the spot light. We describe a hot, new malware - and discuss how well BN did compared to IDA for analysis. We conclude with advice for further BN development.

Dr. DeMott is a industry leader. Developing Vision (an EDR product), as the CTO of Binary Defense Systems. Mr. Stroschein is a senior malware analysis at Bromium and teacher at DSU. Both are expert security trainers at VDA Labs.

@jareddemott, @jstrosch

Back to Derbycon 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast