Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals
4.5 (146 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,037 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 70
  • Length 6 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2015 English

Course Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

What are the requirements?

  • This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

What am I going to get from this course?

  • Learn more about various reversing tools
  • Learn more about common vulnerabilities and how to find them
  • You will become more familiar with simple exploits, web exploitation, and ARM exploitation

What is the target audience?

  • Anyone interested in Reverse Engineering and Exploit Development

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Getting Started
Important - Download These First - Working Files
Preview
Article
Introduction To Reversing
Preview
07:20
About The Author
Preview
03:27
Ethical Considerations
01:57
Reversing Tools - Part 1
05:34
Reversing Tools - Part 2
04:32
Reversing Tools - Part 3
03:09
Reversing Tools - Part 4
03:34
Reversing Tools - Part 5
04:41
Reversing Tools - Part 6
04:35
How To Access Your Working Files
03:22
Section 2: Reversing Compiled Windows Applications
Vulnerabilities - Part 1
05:27
Vulnerabilities - Part 2
05:43
Vulnerabilities - Part 3
04:22
Using Fuzzing - Part 1
05:41
Using Fuzzing - Part 2
05:51
Using Fuzzing - Part 3
06:52
Using Fuzzing - Part 4
06:22
Just Enough Assembly - Part 1
06:55
Just Enough Assembly - Part 2
06:56
Just Enough Assembly - Part 3
03:51
Stack Overflows - Part 1
06:07
Stack Overflows - Part 2
06:09
Stack Overflows - Part 3
07:57
Heap Overflows - Part 1
04:47
Heap Overflows - Part 2
05:50
Heap Overflows - Part 3
03:12
Heap Overflows - Part 4
05:42
Format String Bugs - Part 1
06:43
Format String Bugs - Part 2
07:25
Format String Bugs - Part 3
07:02
Format String Bugs - Part 4
04:14
Section Overflows
06:48
Windows Kernel Flaws
03:32
Decompilers
06:53
Automation - Part 1
05:52
Automation - Part 2
05:47
Section 3: Reversing Compiled OS X Applications
Where Are The Vulnerabilities?
02:28
Locating Stack Overflows
03:32
Heap Overflows
06:06
Section 4: Reversing Compiled Linux Applications
Where Are The Vulnerabilities?
05:03
Linux Stack Overflows - Part 1
04:30
Linux Stack Overflows - Part 2
06:58
Linux Stack Overflows - Part 3
06:23
Linux Stack Overflows - Part 4
05:56
Linux Stack Overflows - Part 5
07:05
Linux Heap Overflows - Part 1
05:25
Linux Heap Overflows - Part 2
06:48
Linux Heap Overflows - Part 3
05:46
Linux Heap Overflows - Part 4
05:05
Linux Kernel Flaws - Part 1
05:36
Linux Kernel Flaws - Part 2
02:44
Section 5: Reversing Android Applications
Introduction To Android And ARM
04:48
Android Applications
03:26
Section 6: Finding Other Vulnerabilities
Web Site Vulnerabilities
05:40
Database Vulnerabilities
05:04
Section 7: Simple Exploits
Going From Vulnerability To Exploit
02:49
A Simple Exploit Script
05:50
Creating A Metasploit Module For An Exploit - Part 1
04:40
Creating A Metasploit Module For An Exploit - Part 2
06:38
Creating A Metasploit Module For An Exploit - Part 3
07:14
Section 8: Exploit Payloads
Shellcode - Part 1
05:53
Shellcode - Part 2
04:58
Shellcode - Part 3
07:05
Shellcode - Part 4
03:48
Section 9: Making Exploits Harder To Detect
Encoding Shellcode - Part 1
05:15
Encoding Shellcode - Part 2
06:03
Section 10: Web Exploitation
Web Exploits In Metasploit
04:29
Section 11: ARM Exploitation
Android Exploits In Metasploit
03:45
Section 12: Future Directions
Wrap Up And Suggestions For Further Study
05:52

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Infinite Skills, High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

Ready to start learning?
Take This Course