Reverse engineering is a key skill for malware analysts and security researchers. In this course, you will learn how to utilize the NSA's Ghidra reverse engineering tool to take your reversing skills to the next level.
The reverse engineering landscape has changed with the introduction of the National Security Agencies’ (NSA) software reverse engineering framework Ghidra, which is a fully-featured, open-source framework for performing reverse engineering of binary code. In this course, Reverse Engineering Malware with Ghidra, you will gain the ability to utilize Ghidra to perform reverse engineering of malware. First, you will learn how to install Ghidra and setup your first project. Next, you will discover how to maximize the user interface to aid in your reverse engineering goals. Finally, you will get hands-on with the decompiler and scripting engine by unpacking a modern trojan. When you're finished with this course, you will have the skills and knowledge of Ghidra needed to reverse engineer malware.
Dr. Josh Stroschein is an Assistant Professor at Dakota State University where he teaches malware analysis, software exploitation, reverse engineering, and penetration testing. Josh also works as a malware analyst for Bromium, an end-point security company and is the Director of Training for the Open Information Security Foundation (OISF).
Course Overview [Autogenerated] Hi, everyone. My name is Dr Josh Stroshine. And welcome to my course Reverse engineering Malware with Hydra. I am an assistant professor at Dakota State University, where I teach our analysis, reverse engineering and softer exploitation. I also worked as a senior Mauer analyst for Bro Me. Um, H P and M, director of training and academic outreach for the Open Information Security Foundation. In this course, we're going to get hands on with Dedra. The reverse engineering landscape has changed with the introduction of this tool, which is a fully feature open source framework for performing reverse engineering, a binary code complete with the decomp pilot. Some of the major topics that we will cover include how to get started with teacher and become proficient in navigating its user interface. Get hands on experience with many of its capabilities, such as the code browser, project management and the D compiler. Explore advanced features such as the Headless Analyzer and the power of Piedras scripts. Throughout this course, you will be able to follow along with hands on demonstrations analyzing real world malware, and by the end of this course, you will have the knowledge and skills necessary to begin Reverse engineering malware with Dedra Before beginning the course. You should be familiar with the basics of reverse engineering and be comfortable with tools such as disassemble, er's and assembly level D buggers. He should also be familiar with how to set up a safe Mauer analysis lab environment. I hope you'll join me on this journey to learn Pedro with reverse engineering. Mauer with KITA at plural site.