Binary Ninja Sidekick: Reverse Engineering Malware with Large Language Models

Sdílet
Vložit
  • čas přidán 8. 05. 2024
  • Throughout this video we look at features of Binary Ninja's Sidekick plugin, which leverages AI and Large Language Models (LLMs) to assist during the reverse engineering process. We leverage these features to reverse engineer components of a Phorpiex malware sample and assist us in generating Python automation to interact with the database using the Binary Ninja API.
    Sidekick 1.0 blog: binary.ninja/2024/04/18/sidek...
    Training: training.invokere.com/course/...
    Twitch: / invokereversing
    Twitter: / invokereversing
    Mastodon: infosec.exchange/@invokerever...
    0:00 Introduction
    1:01 Sidekick Introduction
    1:58 Sidekick Suggestions
    3:18 Function Renaming
    6:17 Function Comments
    9:10 Variable Renaming
    9:48 Assistant Chat Interface
    14:04 Generating Binja Python Automation
    17:07 Pattern and Constant Recognition
    17:34 IRC C2 Functionality Identification
  • Věda a technologie

Komentáře • 2

  • @0x0d4y
    @0x0d4y Před 16 dny

    Excellent video... I just got my license!

  • @tysonbenson
    @tysonbenson Před 16 dny

    Awesome, and thank you! I was researching the plugin this weekend and looking forward to using it!