Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS AWS Certified Developer - Associate CompTIA Security+
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 6 hours on-demand video
  • 1 article
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Exploit Development

Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals
Bestseller
Rating: 4.4 out of 54.4 (1,139 ratings)
10,477 students
Created by Infinite Skills
Last updated 1/2017
English
English [Auto], Portuguese [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Learn more about various reversing tools
  • Learn more about common vulnerabilities and how to find them
  • You will become more familiar with simple exploits, web exploitation, and ARM exploitation

Requirements

  • This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Who this course is for:

  • Anyone interested in Reverse Engineering and Exploit Development

Course content

12 sections • 70 lectures • 6h 6m total length

  • Preview00:01
  • Preview07:20
  • Preview03:27
  • Ethical Considerations
    01:57
  • Reversing Tools - Part 1
    05:34
  • Reversing Tools - Part 2
    04:32
  • Reversing Tools - Part 3
    03:09
  • Reversing Tools - Part 4
    03:34
  • Reversing Tools - Part 5
    04:41
  • Reversing Tools - Part 6
    04:35
  • How To Access Your Working Files
    03:22

  • Vulnerabilities - Part 1
    05:27
  • Vulnerabilities - Part 2
    05:43
  • Vulnerabilities - Part 3
    04:22
  • Using Fuzzing - Part 1
    05:41
  • Using Fuzzing - Part 2
    05:51
  • Using Fuzzing - Part 3
    06:52
  • Using Fuzzing - Part 4
    06:22
  • Just Enough Assembly - Part 1
    06:55
  • Just Enough Assembly - Part 2
    06:56
  • Just Enough Assembly - Part 3
    03:51
  • Stack Overflows - Part 1
    06:07
  • Stack Overflows - Part 2
    06:09
  • Stack Overflows - Part 3
    07:57
  • Heap Overflows - Part 1
    04:47
  • Heap Overflows - Part 2
    05:50
  • Heap Overflows - Part 3
    03:12
  • Heap Overflows - Part 4
    05:42
  • Format String Bugs - Part 1
    06:43
  • Format String Bugs - Part 2
    07:25
  • Format String Bugs - Part 3
    07:02
  • Format String Bugs - Part 4
    04:14
  • Section Overflows
    06:48
  • Windows Kernel Flaws
    03:32
  • Decompilers
    06:53
  • Automation - Part 1
    05:52
  • Automation - Part 2
    05:47

  • Where Are The Vulnerabilities?
    02:28
  • Locating Stack Overflows
    03:32
  • Heap Overflows
    06:06

  • Where Are The Vulnerabilities?
    05:03
  • Linux Stack Overflows - Part 1
    04:30
  • Linux Stack Overflows - Part 2
    06:58
  • Linux Stack Overflows - Part 3
    06:23
  • Linux Stack Overflows - Part 4
    05:56
  • Linux Stack Overflows - Part 5
    07:05
  • Linux Heap Overflows - Part 1
    05:25
  • Linux Heap Overflows - Part 2
    06:48
  • Linux Heap Overflows - Part 3
    05:46
  • Linux Heap Overflows - Part 4
    05:05
  • Linux Kernel Flaws - Part 1
    05:36
  • Linux Kernel Flaws - Part 2
    02:44

  • Introduction To Android And ARM
    04:48
  • Android Applications
    03:26

  • Web Site Vulnerabilities
    05:40
  • Database Vulnerabilities
    05:04

  • Going From Vulnerability To Exploit
    02:49
  • A Simple Exploit Script
    05:50
  • Creating A Metasploit Module For An Exploit - Part 1
    04:40
  • Creating A Metasploit Module For An Exploit - Part 2
    06:38
  • Creating A Metasploit Module For An Exploit - Part 3
    07:14

  • Shellcode - Part 1
    05:53
  • Shellcode - Part 2
    04:58
  • Shellcode - Part 3
    07:05
  • Shellcode - Part 4
    03:48

  • Encoding Shellcode - Part 1
    05:15
  • Encoding Shellcode - Part 2
    06:03

  • Web Exploits In Metasploit
    04:29

Instructor

Infinite Skills
High Quality Training
Infinite Skills
  • 4.3 Instructor Rating
  • 116,128 Reviews
  • 1,223,104 Students
  • 327 Courses

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.