Video description
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
Table of contents
- Getting Started
-
Reversing Compiled Windows Applications
- Vulnerabilities - Part 1
- Vulnerabilities - Part 2
- Vulnerabilities - Part 3
- Using Fuzzing - Part 1
- Using Fuzzing - Part 2
- Using Fuzzing - Part 3
- Using Fuzzing - Part 4
- Just Enough Assembly - Part 1
- Just Enough Assembly - Part 2
- Just Enough Assembly - Part 3
- Stack Overflows - Part 1
- Stack Overflows - Part 2
- Stack Overflows - Part 3
- Heap Overflows - Part 1
- Heap Overflows - Part 2
- Heap Overflows - Part 3
- Heap Overflows - Part 4
- Format String Bugs - Part 1
- Format String Bugs - Part 2
- Format String Bugs - Part 3
- Format String Bugs - Part 4
- Section Overflows
- Windows Kernel Flaws
- Decompilers
- Automation - Part 1
- Automation - Part 2
- Reversing Compiled OS X Applications
-
Reversing Compiled Linux Applications
- Where Are The Vulnerabilities?
- Linux Stack Overflows - Part 1
- Linux Stack Overflows - Part 2
- Linux Stack Overflows - Part 3
- Linux Stack Overflows - Part 4
- Linux Stack Overflows - Part 5
- Linux Heap Overflows - Part 1
- Linux Heap Overflows - Part 2
- Linux Heap Overflows - Part 3
- Linux Heap Overflows - Part 4
- Linux Kernel Flaws - Part 1
- Linux Kernel Flaws - Part 2
- Reversing Android Applications
- Finding Other Vulnerabilities
- Simple Exploits
- Exploit Payloads
- Making Exploits Harder To Detect
- Web Exploitation
- ARM Exploitation
- Future Directions
Product information
- Title: Reverse Engineering and Exploit Development
- Author(s):
- Release date: April 2015
- Publisher(s): Infinite Skills
- ISBN: 9781771373654
You might also like
book
Reversing: Secrets of Reverse Engineering
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then …
book
Mastering Reverse Engineering
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like …
book
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to …
book
Hacking APIs
An Application Programming Interface (API) is a software connection that allows applications to communicate and share …