Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Kaspersky
What does it take to become a good reverse engineer?
Message
<blockquote data-quote="Bot" data-source="post: 875778" data-attributes="member: 52014"><p><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22074400/sas-at-home_intro-749x400.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p>How much money and effort does it take to become a good reverse engineer? Do you even need to be one?</p><p></p><p>There are no universally acceptable answers to these questions. Software reverse engineering (RE) is not a science but a skillset combined with specific knowledge and backed by a lot of experience.</p><p></p><p>For several years, we have been sharing the RE knowledge that we accumulated in the form of training sessions provided to paying customers. These sessions took from two days at <a href="https://thesascon.com/" target="_blank">the SAS conference</a> to complete five workdays in the extended version, and covered many aspects of our own work, primarily in IDA Pro and the in-lab reverse-engineering framework.</p><p></p><p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22082947/sas-at-home_re-webinar_01.png" target="_blank"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22082947/sas-at-home_re-webinar_01.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p><em>A typical piece of code disassembled in IDA Pro</em></p><p></p><p></p><p>Due to the novel 2019 coronavirus disease, our schedule for the training sessions has changed completely. But not only this; the reversing landscape itself has changed since last year. Released in March 2019, the free and open-source reverse engineering tool called Ghidra lowered the barrier to entry into the field.</p><p></p><p><a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22083011/sas-at-home_re-webinar_02.png" target="_blank"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22083011/sas-at-home_re-webinar_02.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p><em>The same piece of code viewed in Ghidra</em></p><p></p><p></p><p>So, while we are all working from home and, hopefully, have time to learn something new, why not tear some binary code apart and pick up some reverse engineering skills? This may prove especially helpful if your work is related to malware, incident response or forensics.</p><p></p><p>It is certainly not feasible to learn RE in one webinar. Within one hour, we will outline the typical workflow that we follow when analyzing malware. We will dissect real-life malicious code using both IDA Pro and Ghidra, and use some of the most useful features of these disassemblers.</p><p></p><p>The rest, as in many other disciplines, comes with experience. And, we are still looking forward to seeing you in our reverse engineering training sessions at SAS Conference 2020 (two days) or elsewhere (a whole week!).</p><p></p><p><a href="https://webinars.on24.com/securityweek/TheSAS2020" target="_blank"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22073738/sas-at-home_hor-banner.jpeg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></a></p><p></p><p><a href="https://securelist.com/become-a-good-reverse-engineer/96743/" target="_blank">Source</a></p></blockquote><p></p>
[QUOTE="Bot, post: 875778, member: 52014"] [IMG]https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22074400/sas-at-home_intro-749x400.png[/IMG] How much money and effort does it take to become a good reverse engineer? Do you even need to be one? There are no universally acceptable answers to these questions. Software reverse engineering (RE) is not a science but a skillset combined with specific knowledge and backed by a lot of experience. For several years, we have been sharing the RE knowledge that we accumulated in the form of training sessions provided to paying customers. These sessions took from two days at [URL='https://thesascon.com/']the SAS conference[/URL] to complete five workdays in the extended version, and covered many aspects of our own work, primarily in IDA Pro and the in-lab reverse-engineering framework. [URL='https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22082947/sas-at-home_re-webinar_01.png'][IMG]https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22082947/sas-at-home_re-webinar_01.png[/IMG][/URL] [I]A typical piece of code disassembled in IDA Pro[/I] Due to the novel 2019 coronavirus disease, our schedule for the training sessions has changed completely. But not only this; the reversing landscape itself has changed since last year. Released in March 2019, the free and open-source reverse engineering tool called Ghidra lowered the barrier to entry into the field. [URL='https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22083011/sas-at-home_re-webinar_02.png'][IMG]https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22083011/sas-at-home_re-webinar_02.png[/IMG][/URL] [I]The same piece of code viewed in Ghidra[/I] So, while we are all working from home and, hopefully, have time to learn something new, why not tear some binary code apart and pick up some reverse engineering skills? This may prove especially helpful if your work is related to malware, incident response or forensics. It is certainly not feasible to learn RE in one webinar. Within one hour, we will outline the typical workflow that we follow when analyzing malware. We will dissect real-life malicious code using both IDA Pro and Ghidra, and use some of the most useful features of these disassemblers. The rest, as in many other disciplines, comes with experience. And, we are still looking forward to seeing you in our reverse engineering training sessions at SAS Conference 2020 (two days) or elsewhere (a whole week!). [URL='https://webinars.on24.com/securityweek/TheSAS2020'][IMG]https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2020/04/22073738/sas-at-home_hor-banner.jpeg[/IMG][/URL] [url="https://securelist.com/become-a-good-reverse-engineer/96743/"]Source[/url] [/QUOTE]
Insert quotes…
Verification
Post reply
Top