0
Trainer Name

Infinite Skills

Skill Area

Scientific or Technical, Statistics or Research and Development

Reviews

3.8 (3 Rating)

Course Requirements

This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

Course Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Course Outcomes

1.Learn more about various reversing tools
2.Learn more about common vulnerabilities and how to find them
3.You will become more familiar with simple exploits, web exploitation, and ARM exploitation

Course Curriculum

1 Reversing Tools - Part 6


2 How To Access Your Working Files


3 Reversing Tools - Part 5


4 Reversing Tools - Part 4


5 Reversing Tools - Part 3


6 Reversing Tools - Part 2


7 Reversing Tools - Part 1


8 Ethical Considerations


9 About The Author


10 Introduction To Reversing


1 Automation - Part 2


2 Automation - Part 1


3 Using Fuzzing - Part 4


4 Using Fuzzing - Part 3


5 Using Fuzzing - Part 2


6 Using Fuzzing - Part 1


7 Vulnerabilities - Part 3


8 Vulnerabilities - Part 2


9 Vulnerabilities - Part 1


10 Just Enough Assembly - Part 1


11 Heap Overflows - Part 3


12 Decompilers


13 Windows Kernel Flaws


14 Section Overflows


15 Format String Bugs - Part 4


16 Format String Bugs - Part 3


17 Format String Bugs - Part 2


18 Format String Bugs - Part 1


19 Heap Overflows - Part 4


20 Heap Overflows - Part 2


21 Heap Overflows - Part 1


22 Stack Overflows - Part 3


23 Stack Overflows - Part 2


24 Stack Overflows - Part 1


25 Just Enough Assembly - Part 3


26 Just Enough Assembly - Part 2


1 Heap Overflows


2 Locating Stack Overflows


3 Where Are The Vulnerabilities


1 Linux Stack Overflows - Part 4


2 Linux Kernel Flaws - Part 2


3 Linux Kernel Flaws - Part 1


4 Linux Heap Overflows - Part 4


5 Linux Heap Overflows - Part 3


6 Linux Heap Overflows - Part 2


7 Linux Heap Overflows - Part 1


8 Linux Stack Overflows - Part 5


9 Linux Stack Overflows - Part 3


10 Linux Stack Overflows - Part 2


11 Linux Stack Overflows - Part 1


12 Where Are The Vulnerabilities


1 Introduction To Android And ARM


2 Android Applications


1 Database Vulnerabilities


2 Web Site Vulnerabilities


1 Creating A Metasploit Module For An Exploit - Part 3


2 Creating A Metasploit Module For An Exploit - Part 2


3 Creating A Metasploit Module For An Exploit - Part 1


4 A Simple Exploit Script


5 Going From Vulnerability To Exploit


1 Shellcode - Part 1


2 Shellcode - Part 4


3 Shellcode - Part 3


4 Shellcode - Part 2


1 Encoding Shellcode - Part 2


2 Encoding Shellcode - Part 1


1 Web Exploits In Metasploit


1 Android Exploits In Metasploit


1 Wrap Up And Suggestions For Further Study


Trainer

Trainer Name

Infinite Skills

3.8 Rating
3 Reviews

More Courses by Author

Learner Feedback

Reverse engineering and exploit development

4

Course Rating
0.00%
100.00%
0.00%
0.00%
0.00%

Log In or Sign Up as learner to post a review

Shopping Cart

Loading...