Dates: May 30- June 2 2022
Location: Hilton Double Tree
Capacity: 20 Seats
This is a hands-on course on using Ghidra for reverse engineering and vulnerability research. Exercises include Windows binaries, Linux binaries, and device firmware. Binaries will also be in a variety of architectures, including ARM, PowerPC, MIPS, x86, and x64. After completing this course, students will have the practical skills to use Ghidra in their day-to-day reversing tasks.
Students are expected to have some experience with static and dynamic analysis, Linux, Windows, command line tools, shell scripting, C, and Python. Students should have the ability to do the following:
- Declare an array pointer in C
- Write a python script to XOR an encoded string
- Perform a function trace using a debugger
- Identify dead code using a disassembler
Minimum Software requirements :
Students are expected to have their own computers which can run a 30GB virtual machine. A recommended hardware configuration is the following:
- 50 GB of free hard disk space
- 16 Gb of RAM
- 4 Prosessor cores
- VMWare Player/Workstation/Fusion to import an ova file
Kayla Afanador is a senior technical staff member and instructor at BCI. Prior to that, Kayla was the Cyber Research & Development lead for the U.S. Naval Air Warfare Center Weapons Division. Kayla completed her PhD in computer science at the Naval Postgraduate School with a focus on automated vulnerability research.
Click here to register.