Reverse Engineering and Exploit Development
4.3 (218 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,832 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Reverse Engineering and Exploit Development to your Wishlist.

Add to Wishlist

Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals
4.3 (218 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,832 students enrolled
Created by Infinite Skills
Last updated 1/2017
English
Current price: $10 Original price: $50 Discount: 80% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 6 hours on-demand video
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn more about various reversing tools
  • Learn more about common vulnerabilities and how to find them
  • You will become more familiar with simple exploits, web exploitation, and ARM exploitation
View Curriculum
Requirements
  • This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
Description

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Who is the target audience?
  • Anyone interested in Reverse Engineering and Exploit Development
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 70 Lectures Collapse All 70 Lectures 06:06:54
+
Getting Started
11 Lectures 42:12



Ethical Considerations
01:57

Reversing Tools - Part 1
05:34

Reversing Tools - Part 2
04:32

Reversing Tools - Part 3
03:09

Reversing Tools - Part 4
03:34

Reversing Tools - Part 5
04:41

Reversing Tools - Part 6
04:35

How To Access Your Working Files
03:22
+
Reversing Compiled Windows Applications
26 Lectures 02:32:00
Vulnerabilities - Part 1
05:27

Vulnerabilities - Part 2
05:43

Vulnerabilities - Part 3
04:22

Using Fuzzing - Part 1
05:41

Using Fuzzing - Part 2
05:51

Using Fuzzing - Part 3
06:52

Using Fuzzing - Part 4
06:22

Just Enough Assembly - Part 1
06:55

Just Enough Assembly - Part 2
06:56

Just Enough Assembly - Part 3
03:51

Stack Overflows - Part 1
06:07

Stack Overflows - Part 2
06:09

Stack Overflows - Part 3
07:57

Heap Overflows - Part 1
04:47

Heap Overflows - Part 2
05:50

Heap Overflows - Part 3
03:12

Heap Overflows - Part 4
05:42

Format String Bugs - Part 1
06:43

Format String Bugs - Part 2
07:25

Format String Bugs - Part 3
07:02

Format String Bugs - Part 4
04:14

Section Overflows
06:48

Windows Kernel Flaws
03:32

Decompilers
06:53

Automation - Part 1
05:52

Automation - Part 2
05:47
+
Reversing Compiled OS X Applications
3 Lectures 12:06
Where Are The Vulnerabilities?
02:28

Locating Stack Overflows
03:32

Heap Overflows
06:06
+
Reversing Compiled Linux Applications
12 Lectures 01:07:19
Where Are The Vulnerabilities?
05:03

Linux Stack Overflows - Part 1
04:30

Linux Stack Overflows - Part 2
06:58

Linux Stack Overflows - Part 3
06:23

Linux Stack Overflows - Part 4
05:56

Linux Stack Overflows - Part 5
07:05

Linux Heap Overflows - Part 1
05:25

Linux Heap Overflows - Part 2
06:48

Linux Heap Overflows - Part 3
05:46

Linux Heap Overflows - Part 4
05:05

Linux Kernel Flaws - Part 1
05:36

Linux Kernel Flaws - Part 2
02:44
+
Reversing Android Applications
2 Lectures 08:14
Introduction To Android And ARM
04:48

Android Applications
03:26
+
Finding Other Vulnerabilities
2 Lectures 10:44
Web Site Vulnerabilities
05:40

Database Vulnerabilities
05:04
+
Simple Exploits
5 Lectures 27:11
Going From Vulnerability To Exploit
02:49

A Simple Exploit Script
05:50

Creating A Metasploit Module For An Exploit - Part 1
04:40

Creating A Metasploit Module For An Exploit - Part 2
06:38

Creating A Metasploit Module For An Exploit - Part 3
07:14
+
Exploit Payloads
4 Lectures 21:44
Shellcode - Part 1
05:53

Shellcode - Part 2
04:58

Shellcode - Part 3
07:05

Shellcode - Part 4
03:48
+
Making Exploits Harder To Detect
2 Lectures 11:18
Encoding Shellcode - Part 1
05:15

Encoding Shellcode - Part 2
06:03
+
Web Exploitation
1 Lecture 04:29
Web Exploits In Metasploit
04:29
2 More Sections
About the Instructor
Infinite Skills
4.4 Average rating
37,992 Reviews
688,555 Students
331 Courses
High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.