lt;pgt;The need for reverse engineering binary software components arises in more and more contexts every day. Common cases include analysis of malicious software such as viruses, worms, trojans and rootkits, analysing binary drivers in order [...]
  • GHIDRA-QA
  • Cena na vyžádání

lt;pgt;The need for reverse engineering binary software components arises in more and more contexts every day. Common cases include analysis of malicious software such as viruses, worms, trojans and rootkits, analysing binary drivers in order to develop open-source drivers for alternate platforms, analysing closed source software for security flaws, and source code recovery in legacy systems.lt;/pgt;lt;pgt; lt;/pgt;lt;pgt;The first step in such an analysis is generally the acquisition of a high-quality disassembly of the binary component. Ghidra was developed at the US National Security Agency to meet or exceed the capabilities provided by modern commercial disassemblers. Ghidra is free to download, install, and use and is capable of disassembling and decompiling machine languages for a large number of microprocessors and microcontrollers. This course will cover essential background material for effective reverse engineering before diving into the features you will find most useful when using Ghidra for your reverse engineering tasks.lt;/pgt;lt;pgt; lt;/pgt;lt;pgt;Course Structure: The course consists of 40 hours of instruction over five days, combining lectures with targeted hands-on exercises designed to familiarize the student with the capabilities of Ghidra and its uses in analysing various types of binary files. Students are provided with digital copies of all materials used throughout the course.lt;/pgt;

Mám zájem o vybraný QA kurz