Skip to main content

Debuggers 1103: Introductory Binary Ninja


OpenSecurityTraining2
Enrollment in this course is by invitation only

About This Course

This course introduces the Binary Ninja user interface and focuses on how to use the debugger. It covers tasks such as installation, loading a binary, using breakpoints, stepping through execution, and examining memory and registers.

Requirements

You must be comfortable with C programming and x86 assembly language, as taught in Architecture 1001 on this site.

Course Staff

Xusheng Li

Xusheng Li is a software engineer at Vector 35, where he serves as one of the core developers of Binary Ninja and leads the development of its debugger. His research interests span reverse engineering, malware analysis, vulnerability research, and code obfuscation. He is an editor of Paged Out!, a magazine dedicated to low-level and security-focused topics, and also serves as an administrator and reviewer for crackmes.one, the world’s largest repository of reverse engineering challenges. He enjoys playing CTF and has completed the Flare-On reverse engineering challenge three times. He is now a member of the Shellphish CTF team. He has authored numerous research papers, technical blog posts, and book chapters on malware reverse engineering, system internals, and deobfuscation techniques.