Reverse Engineering and Exploit Development
Reverse Engineering and Exploit Development, available at $49.99, has an average rating of 4.75, with 70 lectures, based on 1269 reviews, and has 11415 subscribers.
You will learn about Learn more about various reversing tools Learn more about common vulnerabilities and how to find them You will become more familiar with simple exploits, web exploitation, and ARM exploitation This course is ideal for individuals who are Anyone interested in Reverse Engineering and Exploit Development It is particularly useful for Anyone interested in Reverse Engineering and Exploit Development.
Enroll now: Reverse Engineering and Exploit Development
Summary
Title: Reverse Engineering and Exploit Development
Price: $49.99
Average Rating: 4.75
Number of Lectures: 70
Number of Published Lectures: 70
Number of Curriculum Items: 70
Number of Published Curriculum Objects: 70
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn more about various reversing tools
- Learn more about common vulnerabilities and how to find them
- You will become more familiar with simple exploits, web exploitation, and ARM exploitation
Who Should Attend
- Anyone interested in Reverse Engineering and Exploit Development
Target Audiences
- Anyone interested in Reverse Engineering and Exploit Development
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
Course Curriculum
Chapter 1: Getting Started
Lecture 1: Important – Download These First – Working Files
Lecture 2: Introduction To Reversing
Lecture 3: About The Author
Lecture 4: Ethical Considerations
Lecture 5: Reversing Tools – Part 1
Lecture 6: Reversing Tools – Part 2
Lecture 7: Reversing Tools – Part 3
Lecture 8: Reversing Tools – Part 4
Lecture 9: Reversing Tools – Part 5
Lecture 10: Reversing Tools – Part 6
Lecture 11: How To Access Your Working Files
Chapter 2: Reversing Compiled Windows Applications
Lecture 1: Vulnerabilities – Part 1
Lecture 2: Vulnerabilities – Part 2
Lecture 3: Vulnerabilities – Part 3
Lecture 4: Using Fuzzing – Part 1
Lecture 5: Using Fuzzing – Part 2
Lecture 6: Using Fuzzing – Part 3
Lecture 7: Using Fuzzing – Part 4
Lecture 8: Just Enough Assembly – Part 1
Lecture 9: Just Enough Assembly – Part 2
Lecture 10: Just Enough Assembly – Part 3
Lecture 11: Stack Overflows – Part 1
Lecture 12: Stack Overflows – Part 2
Lecture 13: Stack Overflows – Part 3
Lecture 14: Heap Overflows – Part 1
Lecture 15: Heap Overflows – Part 2
Lecture 16: Heap Overflows – Part 3
Lecture 17: Heap Overflows – Part 4
Lecture 18: Format String Bugs – Part 1
Lecture 19: Format String Bugs – Part 2
Lecture 20: Format String Bugs – Part 3
Lecture 21: Format String Bugs – Part 4
Lecture 22: Section Overflows
Lecture 23: Windows Kernel Flaws
Lecture 24: Decompilers
Lecture 25: Automation – Part 1
Lecture 26: Automation – Part 2
Chapter 3: Reversing Compiled OS X Applications
Lecture 1: Where Are The Vulnerabilities?
Lecture 2: Locating Stack Overflows
Lecture 3: Heap Overflows
Chapter 4: Reversing Compiled Linux Applications
Lecture 1: Where Are The Vulnerabilities?
Lecture 2: Linux Stack Overflows – Part 1
Lecture 3: Linux Stack Overflows – Part 2
Lecture 4: Linux Stack Overflows – Part 3
Lecture 5: Linux Stack Overflows – Part 4
Lecture 6: Linux Stack Overflows – Part 5
Lecture 7: Linux Heap Overflows – Part 1
Lecture 8: Linux Heap Overflows – Part 2
Lecture 9: Linux Heap Overflows – Part 3
Lecture 10: Linux Heap Overflows – Part 4
Lecture 11: Linux Kernel Flaws – Part 1
Lecture 12: Linux Kernel Flaws – Part 2
Chapter 5: Reversing Android Applications
Lecture 1: Introduction To Android And ARM
Lecture 2: Android Applications
Chapter 6: Finding Other Vulnerabilities
Lecture 1: Web Site Vulnerabilities
Lecture 2: Database Vulnerabilities
Chapter 7: Simple Exploits
Lecture 1: Going From Vulnerability To Exploit
Lecture 2: A Simple Exploit Script
Lecture 3: Creating A Metasploit Module For An Exploit – Part 1
Lecture 4: Creating A Metasploit Module For An Exploit – Part 2
Lecture 5: Creating A Metasploit Module For An Exploit – Part 3
Chapter 8: Exploit Payloads
Lecture 1: Shellcode – Part 1
Lecture 2: Shellcode – Part 2
Lecture 3: Shellcode – Part 3
Lecture 4: Shellcode – Part 4
Chapter 9: Making Exploits Harder To Detect
Lecture 1: Encoding Shellcode – Part 1
Lecture 2: Encoding Shellcode – Part 2
Chapter 10: Web Exploitation
Lecture 1: Web Exploits In Metasploit
Chapter 11: ARM Exploitation
Lecture 1: Android Exploits In Metasploit
Chapter 12: Future Directions
Lecture 1: Wrap Up And Suggestions For Further Study
Instructors
-
Infinite Skills
High Quality Training
Rating Distribution
- 1 stars: 36 votes
- 2 stars: 44 votes
- 3 stars: 172 votes
- 4 stars: 392 votes
- 5 stars: 625 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple