Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 08/01/15 in all areas

  1. Reverse Engineering and Exploit Development Hello RST : Description In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering. You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation. Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons. Publisher: Infinite Skills Duration: 6 hours 69 tutorial videos Date Released: 2015-04-10 Price: $99.99 USD Table of Contents 01. Getting Started Introduction To Reversing About The Author Ethical Considerations Reversing Tools - Part 1 Reversing Tools - Part 2 Reversing Tools - Part 3 Reversing Tools - Part 4 Reversing Tools - Part 5 Reversing Tools - Part 6 0110 How To Access Your Working Files 02. Reversing Compiled Windows Applications 0201 Vulnerabilities - Part 1 0202 Vulnerabilities - Part 2 0203 Vulnerabilities - Part 3 0204 Using Fuzzing - Part 1 0205 Using Fuzzing - Part 2 0206 Using Fuzzing - Part 3 0207 Using Fuzzing - Part 4 0208 Just Enough Assembly - Part 1 0209 Just Enough Assembly - Part 2 0210 Just Enough Assembly - Part 3 0211 Stack Overflows - Part 1 0212 Stack Overflows - Part 2 0213 Stack Overflows - Part 3 0214 Heap Overflows - Part 1 0215 Heap Overflows - Part 2 0216 Heap Overflows - Part 3 0217 Heap Overflows - Part 4 0218 Format String Bugs - Part 1 0219 Format String Bugs - Part 2 0220 Format String Bugs - Part 3 0221 Format String Bugs - Part 4 0222 Section Overflows 0223 Windows Kernel Flaws 0224 Decompilers 0225 Automation - Part 1 0226 Automation - Part 2 03. Reversing Compiled OS X Applications 0301 Where Are The Vulnerabilities? 0302 Locating Stack Overflows 0303 Heap Overflows 04. Reversing Compiled Linux Applications 0401 Where Are The Vulnerabilities? 0402 Linux Stack Overflows - Part 1 0403 Linux Stack Overflows - Part 2 0404 Linux Stack Overflows - Part 3 0405 Linux Stack Overflows - Part 4 0406 Linux Stack Overflows - Part 5 0407 Linux Heap Overflows - Part 1 0408 Linux Heap Overflows - Part 2 0409 Linux Heap Overflows - Part 3 0410 Linux Heap Overflows - Part 4 0411 Linux Kernel Flaws - Part 1 0412 Linux Kernel Flaws - Part 2 05. Reversing Android Applications 0501 Introduction To Android And ARM 0502 Android Applications 06. Finding Other Vulnerabilities 0601 Web Site Vulnerabilities 0602 Database Vulnerabilities 07. Simple Exploits 0701 Going From Vulnerability To Exploit 0702 A Simple Exploit Script 0703 Creating A Metasploit Module For An Exploit - Part 1 0704 Creating A Metasploit Module For An Exploit - Part 2 0705 Creating A Metasploit Module For An Exploit - Part 3 08. Exploit Payloads 0801 Shellcode - Part 1 0802 Shellcode - Part 2 0803 Shellcode - Part 3 0804 Shellcode - Part 4 09. Making Exploits Harder To Detect 0901 Encoding Shellcode - Part 1 0902 Encoding Shellcode - Part 2 10. Web Exploitation 1001 Web Exploits In Metasploit 11. ARM Exploitation 1101 Android Exploits In Metasploit 12. Future Directions 1201 Wrap Up And Suggestions For Further Study Download NitroFlare - Upload Files [505 MB] NitroFlare - Upload Files [505 MB] NitroFlare - Upload Files [434.45 MB] Download Working_Files http://examples.oreilly.com/0636920040439/Working_Files.zip Source Reverse Engineering and Exploit Development Training Video, Online Tutorial Regards NO-MERCY
    1 point
×
×
  • Create New...