Jump to content
NO-MERCY

Reverse Engineering and Exploit Development - Training Video 6 Hours

Recommended Posts

Posted (edited)

Reverse Engineering and Exploit Development

reed.jpg?sbsr=f0b2a4f4170257904e43f5d4d14218a295a&lgfp=3000

Hello RST :

Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Publisher: Infinite Skills

Duration: 6 hours

69 tutorial videos

Date Released: 2015-04-10

Price: $99.99 USD

Table of Contents

01. Getting Started

Introduction To Reversing

About The Author

Ethical Considerations

Reversing Tools - Part 1

Reversing Tools - Part 2

Reversing Tools - Part 3

Reversing Tools - Part 4

Reversing Tools - Part 5

Reversing Tools - Part 6

0110 How To Access Your Working Files

02. Reversing Compiled Windows Applications

0201 Vulnerabilities - Part 1

0202 Vulnerabilities - Part 2

0203 Vulnerabilities - Part 3

0204 Using Fuzzing - Part 1

0205 Using Fuzzing - Part 2

0206 Using Fuzzing - Part 3

0207 Using Fuzzing - Part 4

0208 Just Enough Assembly - Part 1

0209 Just Enough Assembly - Part 2

0210 Just Enough Assembly - Part 3

0211 Stack Overflows - Part 1

0212 Stack Overflows - Part 2

0213 Stack Overflows - Part 3

0214 Heap Overflows - Part 1

0215 Heap Overflows - Part 2

0216 Heap Overflows - Part 3

0217 Heap Overflows - Part 4

0218 Format String Bugs - Part 1

0219 Format String Bugs - Part 2

0220 Format String Bugs - Part 3

0221 Format String Bugs - Part 4

0222 Section Overflows

0223 Windows Kernel Flaws

0224 Decompilers

0225 Automation - Part 1

0226 Automation - Part 2

03. Reversing Compiled OS X Applications

0301 Where Are The Vulnerabilities?

0302 Locating Stack Overflows

0303 Heap Overflows

04. Reversing Compiled Linux Applications

0401 Where Are The Vulnerabilities?

0402 Linux Stack Overflows - Part 1

0403 Linux Stack Overflows - Part 2

0404 Linux Stack Overflows - Part 3

0405 Linux Stack Overflows - Part 4

0406 Linux Stack Overflows - Part 5

0407 Linux Heap Overflows - Part 1

0408 Linux Heap Overflows - Part 2

0409 Linux Heap Overflows - Part 3

0410 Linux Heap Overflows - Part 4

0411 Linux Kernel Flaws - Part 1

0412 Linux Kernel Flaws - Part 2

05. Reversing Android Applications

0501 Introduction To Android And ARM

0502 Android Applications

06. Finding Other Vulnerabilities

0601 Web Site Vulnerabilities

0602 Database Vulnerabilities

07. Simple Exploits

0701 Going From Vulnerability To Exploit

0702 A Simple Exploit Script

0703 Creating A Metasploit Module For An Exploit - Part 1

0704 Creating A Metasploit Module For An Exploit - Part 2

0705 Creating A Metasploit Module For An Exploit - Part 3

08. Exploit Payloads

0801 Shellcode - Part 1

0802 Shellcode - Part 2

0803 Shellcode - Part 3

0804 Shellcode - Part 4

09. Making Exploits Harder To Detect

0901 Encoding Shellcode - Part 1

0902 Encoding Shellcode - Part 2

10. Web Exploitation

1001 Web Exploits In Metasploit

11. ARM Exploitation

1101 Android Exploits In Metasploit

12. Future Directions

1201 Wrap Up And Suggestions For Further Study

Download

NitroFlare - Upload Files [505 MB]

NitroFlare - Upload Files [505 MB]

NitroFlare - Upload Files [434.45 MB]

Download Working_Files

http://examples.oreilly.com/0636920040439/Working_Files.zip

Source :)

Reverse Engineering and Exploit Development Training Video, Online Tutorial

Regards

NO-MERCY

Edited by NO-MERCY
  • Upvote 1

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...