Reverse Engineering and Exploit Development

S$60.00
Take This Course
Reverse Engineering and Exploit Development

Course Description
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

What are the requirements?
This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
What am I going to get from this course?
Learn more about various reversing tools
Learn more about common vulnerabilities and how to find them
You will become more familiar with simple exploits, web exploitation, and ARM exploitation
What is the target audience?
Anyone interested in Reverse Engineering and Exploit Development

Curriculum

Section 1: Getting Started
Important – Download These First – Working Files
Article
Introduction To Reversing
07:20
About The Author
03:27
Ethical Considerations
01:57
Reversing Tools – Part 1
05:34
Reversing Tools – Part 2
04:32
Reversing Tools – Part 3
03:09
Reversing Tools – Part 4
03:34
Reversing Tools – Part 5
04:41
Reversing Tools – Part 6
04:35
How To Access Your Working Files
03:22
Section 2: Reversing Compiled Windows Applications
Vulnerabilities – Part 1
05:27
Vulnerabilities – Part 2
05:43
Vulnerabilities – Part 3
04:22
Using Fuzzing – Part 1
05:41
Using Fuzzing – Part 2
05:51
Using Fuzzing – Part 3
06:52
Using Fuzzing – Part 4
06:22
Just Enough Assembly – Part 1
06:55
Just Enough Assembly – Part 2
06:56
Just Enough Assembly – Part 3
03:51
Stack Overflows – Part 1
06:07
Stack Overflows – Part 2
06:09
Stack Overflows – Part 3
07:57
Heap Overflows – Part 1
04:47
Heap Overflows – Part 2
05:50
Heap Overflows – Part 3
03:12
Heap Overflows – Part 4
05:42
Format String Bugs – Part 1
06:43
Format String Bugs – Part 2
07:25
Format String Bugs – Part 3
07:02
Format String Bugs – Part 4
04:14
Section Overflows
06:48
Windows Kernel Flaws
03:32
Decompilers
06:53
Automation – Part 1
05:52
Automation – Part 2
05:47
Section 3: Reversing Compiled OS X Applications
Where Are The Vulnerabilities?
02:28
Locating Stack Overflows
03:32
Heap Overflows
06:06
Section 4: Reversing Compiled Linux Applications
Where Are The Vulnerabilities?
05:03
Linux Stack Overflows – Part 1
04:30
Linux Stack Overflows – Part 2
06:58
Linux Stack Overflows – Part 3
06:23
Linux Stack Overflows – Part 4
05:56
Linux Stack Overflows – Part 5
07:05
Linux Heap Overflows – Part 1
05:25
Linux Heap Overflows – Part 2
06:48
Linux Heap Overflows – Part 3
05:46
Linux Heap Overflows – Part 4
05:05
Linux Kernel Flaws – Part 1
05:36
Linux Kernel Flaws – Part 2
02:44
Section 5: Reversing Android Applications
Introduction To Android And ARM
04:48
Android Applications
03:26
Section 6: Finding Other Vulnerabilities
Web Site Vulnerabilities
05:40
Database Vulnerabilities
05:04
Section 7: Simple Exploits
Going From Vulnerability To Exploit
02:49
A Simple Exploit Script
05:50
Creating A Metasploit Module For An Exploit – Part 1
04:40
Creating A Metasploit Module For An Exploit – Part 2
06:38
Creating A Metasploit Module For An Exploit – Part 3
07:14
Section 8: Exploit Payloads
Shellcode – Part 1
05:53
Shellcode – Part 2
04:58
Shellcode – Part 3
07:05
Shellcode – Part 4
03:48
Section 9: Making Exploits Harder To Detect
Encoding Shellcode – Part 1
05:15
Encoding Shellcode – Part 2
06:03
Section 10: Web Exploitation
Web Exploits In Metasploit
04:29
Section 11: ARM Exploitation
Android Exploits In Metasploit
03:45
Section 12: Future Directions
Wrap Up And Suggestions For Further Study
05:52

Instructor Biography
Infinite Skills, High Quality Training
Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today’s commercial environment.

Course Features

  • Lectures
    Fatal error: Uncaught Error: Call to undefined method LP_Course::get_lessons() in /home2/waf6oo0adwwo/public_html/wp-content/themes/eduma/inc/learnpress-v2-functions.php:624 Stack trace: #0 /home2/waf6oo0adwwo/public_html/wp-content/themes/eduma/learnpress-v2/single-course/content-landing.php(64): thim_course_info() #1 /home2/waf6oo0adwwo/public_html/wp-content/plugins/learnpress/inc/lp-template-functions.php(2492): include('/home2/waf6oo0a...') #2 /home2/waf6oo0adwwo/public_html/wp-content/themes/eduma/learnpress-v2/content-single-course.php(65): learn_press_get_template('single-course/c...', Array) #3 /home2/waf6oo0adwwo/public_html/wp-content/plugins/learnpress/inc/lp-template-functions.php(2492): include('/home2/waf6oo0a...') #4 /home2/waf6oo0adwwo/public_html/wp-content/plugins/learnpress/inc/lp-template-functions.php(1563): learn_press_get_template('content-single-...') #5 /home2/waf6oo0adwwo/public_html/wp-includes/class-wp-hook.php(286): learn_press_content_single_course('') #6 /home2/waf6oo0adwwo/public_html/wp-i in /home2/waf6oo0adwwo/public_html/wp-content/themes/eduma/inc/learnpress-v2-functions.php on line 624