This course is for experienced reverse engineers, researchers, and analysts looking to migrate from other tools and workflows.
This course provides a comprehensive tour of Binary Ninja's powerful core analysis features, emphasizing the additional capabilities and specific differences between it and other popular tools. We'll also explore performing actions through Binary Ninja's extremely ergonomic Python API, and how to use or extend its analysis results to accelerate your reverse engineering process.
All-in-all, this class will cover everything you need to get the most out of your new best friend!
Kyle Martin is a cyber security software engineer and educator, focused on making all things “binary” easier for humans to understand.
Kyle first started teaching at 15 when he became the head counselor at a summer-long computer camp, rewriting their C++ and x86 assembly courses. More recently Kyle led the body of students behind CSAW CTF and CSAW Red, including the internal training initiative enabling students to write the renowned challenges that distinguished those competitions.
Now, Kyle runs reverse engineering focused trainings internationally. Kyle brings with him the expertise and support of the entire Vector 35 team, creators of Binary Ninja.
Jordan Wiens used to play a lot of CTF, even winning some like DEF CON a handful of times but then they got hard and now he mostly likes to talk about them and make challenges.
Professionally, he's been a network security engineer, vulnerability researcher, engineering manager, and for the last eight years small business founder with two co-founders of Vector 35, makers of Binary Ninja
He's given trainings over two decades across the academic, government, and commercial sectors on reverse engineering and vulnerability research and has presented at conferences like DEF CON, BlueHat, ShmooCon, Insomni'hack, SAS, and many others.
Students must be able to read and write intermediate-level Python scripts. A foundation in reverse engineering, vulnerability research, firmware analysis, or similar would be helpful, but not required. Students should be familiar with how the stack works, what the heap is, and some basic vulnerability classes (buffer overflow, stack smashing, etc). Guided exercises reminiscent of low-point reversing CTF challenges are integrated into the course, and students should be able to derive their own solutions.