Oreilly - Reverse Engineering and Exploit Development - 9781771373654
Oreilly - Reverse Engineering and Exploit Development
by Philip Polstra | Publisher: Infinite Skills | Release Date: April 2015 | ISBN: 9781771373654


In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
  1. Getting Started
    • Introduction To Reversing 00:07:20
    • About The Author 00:03:28
    • Ethical Considerations 00:01:57
    • Reversing Tools - Part 1 00:05:35
    • Reversing Tools - Part 2 00:04:32
    • Reversing Tools - Part 3 00:03:10
    • Reversing Tools - Part 4 00:03:34
    • Reversing Tools - Part 5 00:04:42
    • Reversing Tools - Part 6 00:04:35
  2. Reversing Compiled Windows Applications
    • Vulnerabilities - Part 1 00:05:27
    • Vulnerabilities - Part 2 00:05:43
    • Vulnerabilities - Part 3 00:04:22
    • Using Fuzzing - Part 1 00:05:41
    • Using Fuzzing - Part 2 00:05:52
    • Using Fuzzing - Part 3 00:06:53
    • Using Fuzzing - Part 4 00:06:22
    • Just Enough Assembly - Part 1 00:06:56
    • Just Enough Assembly - Part 2 00:06:56
    • Just Enough Assembly - Part 3 00:03:52
    • Stack Overflows - Part 1 00:06:08
    • Stack Overflows - Part 2 00:06:09
    • Stack Overflows - Part 3 00:07:57
    • Heap Overflows - Part 1 00:04:47
    • Heap Overflows - Part 2 00:05:50
    • Heap Overflows - Part 3 00:03:12
    • Heap Overflows - Part 4 00:05:42
    • Format String Bugs - Part 1 00:06:43
    • Format String Bugs - Part 2 00:07:26
    • Format String Bugs - Part 3 00:07:03
    • Format String Bugs - Part 4 00:04:14
    • Section Overflows 00:06:49
    • Windows Kernel Flaws 00:03:33
    • Decompilers 00:06:53
    • Automation - Part 1 00:05:53
    • Automation - Part 2 00:05:47
  3. Reversing Compiled OS X Applications
    • Where Are The Vulnerabilities? 00:02:28
    • Locating Stack Overflows 00:03:32
    • Heap Overflows 00:06:06
  4. Reversing Compiled Linux Applications
    • Where Are The Vulnerabilities? 00:05:04
    • Linux Stack Overflows - Part 1 00:04:31
    • Linux Stack Overflows - Part 2 00:06:58
    • Linux Stack Overflows - Part 3 00:06:23
    • Linux Stack Overflows - Part 4 00:05:56
    • Linux Stack Overflows - Part 5 00:07:06
    • Linux Heap Overflows - Part 1 00:05:26
    • Linux Heap Overflows - Part 2 00:06:48
    • Linux Heap Overflows - Part 3 00:05:46
    • Linux Heap Overflows - Part 4 00:05:05
    • Linux Kernel Flaws - Part 1 00:05:37
    • Linux Kernel Flaws - Part 2 00:02:45
  5. Reversing Android Applications
    • Introduction To Android And ARM 00:04:48
    • Android Applications 00:03:26
  6. Finding Other Vulnerabilities
    • Web Site Vulnerabilities 00:05:41
    • Database Vulnerabilities 00:05:05
  7. Simple Exploits
    • Going From Vulnerability To Exploit 00:02:49
    • A Simple Exploit Script 00:05:50
    • Creating A Metasploit Module For An Exploit - Part 1 00:04:41
    • Creating A Metasploit Module For An Exploit - Part 2 00:06:38
    • Creating A Metasploit Module For An Exploit - Part 3 00:07:14
  8. Exploit Payloads
    • Shellcode - Part 1 00:05:54
    • Shellcode - Part 2 00:04:58
    • Shellcode - Part 3 00:07:06
    • Shellcode - Part 4 00:03:48
  9. Making Exploits Harder To Detect
    • Encoding Shellcode - Part 1 00:05:16
    • Encoding Shellcode - Part 2 00:06:03
  10. Web Exploitation
    • Web Exploits In Metasploit 00:04:30
  11. ARM Exploitation
    • Android Exploits In Metasploit 00:03:46
  12. Future Directions
    • Wrap Up And Suggestions For Further Study 00:05:52
  13. Oreilly - Reverse Engineering and Exploit Development


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss