Sign up for our SOC Summit Live Training March 26 - April 10, 2026  Register Here

Workshop: Foundations of Dynamic Analysis for AppSec

Course Authored by .

In this workshop, you’ll learn how compiled programs work at runtime. Through hands-on labs, you’ll understand how programs are structured, executed, and represented in memory, during the execution process.

Course Length: 4 Hours

Includes a Certificate of Completion



Description

In this workshop, you’ll learn how compiled programs work at runtime. Through hands-on labs, you’ll understand how programs are structured, executed, and represented in memory, during the execution process.

You’ll practice tracing and intercepting functions, modifying return values, and observing program behavior in real time without recompiling. Using Frida, a free and open-source dynamic instrumentation framework, you’ll gain practical experience inspecting and manipulating simple C programs.

By the end of the workshop, you’ll have a strong foundation in dynamic analysis that you can apply to desktop and mobile application analysis, and a solid base to grow into more advanced topics such as mobile and desktop testing.

  • System Requirements:
    • Students are expected to deploy their own Kali Linux or Ubuntu operating virtual machine on a virtualization platform of their choice. Instructions for installing the required tools will be sent out the day before the workshop.

Syllabus

  • Introduction to Compiled Binaries and Reverse Engineering Concepts

  • Introduction to Dynamic Analysis Techniques

  • Intercepting and Analyzing Running Programs (Lab)

  • Modifying Function Inputs and Returns (Lab)

  • When Things Go Wrong (Lab)

  • Discussion of Mobile Caveats

FAQ

Student Requirements / Prerequisites:

Students should have:

  • Basic familiarity with programming concepts (any language)

  • Comfort using the command line

  • Familiarity with assembly concepts is helpful but not required

Who Should Take This Workshop:

Anyone new to dynamic program analysis who would like to build a solid foundational understanding. Some programming experience is useful, but certainly not required.

Key Takeaways:

By the end of this workshop, students will be able to:

  • Confidently explain general program architecture and runtime behavior

  • Instrument and hook native binaries without source code

  • Inspect and modify program behavior

About the Instructor

Pixel splash background
Bio

Cameron Cartier is a security consultant at Black Hills Information Security. She holds a master’s degree in computer science from the University of Utah where she studied Tor and other privacy-enhancing technologies. In her role at BHIS, Cameron specializes in social engineering, physical security testing, and web application exploitation. Outside of work, Cameron is an amateur cage fighter and rock climber.

Shopping Cart

No products in the cart.