It’s comparatively simple to query blocks of code, functions, trace execution flow, query register states, and many other tasks that seem herculean within IDA. It does analysis on its own intermediate language (IL), which is exposed through Python and C++ APIs. If you’re wondering how to remain competitive in a post-DARPA DEFCON CTF, I highly recommend you take a look at Binary Ninja.īefore I share how I slashed through the three challenges - 334 cuts, 666 cuts, and 1,000 cuts - I have to acknowledge the tool that made my work possible.Ĭompared to my experience with IDA, which is held together with duct tape and prayers, Binary Ninja’s workflow is a pleasure. Using Vector35’s Binary Ninja, a promising new interactive static analysis and reverse engineering platform, I wrote a script that generated “exploits” for 2,000 unique binaries in this year’s DEFCON CTF qualifying round.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |