Application of Radare2 Illustrated by Shylock and Snakso.A Analysis
Author: Anton Kochkov
The speaker will present his experience of applying Radare2 — an open-source reverse engineering tool, and illustrate it by the examples of the Windows trojan Shylock and 64-bit Linux malware Snakso.A. The techniques of analysis include both statistical disassembling of the code and its debugging with Radare2.
Anton Kochkov has been Lead Developer at Security Code since 2013. During the last several years he focused on reverse engineering PC, ARM, and MIPS code. He contributes to the projects coreboot and Radare2.