07-15-2019, 09:12 PM
Reverse Engineering and Exploit Development | 1.29GB
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.
What you'll learn
Learn more about various reversing tools
Learn more about common vulnerabilities and how to find them
You will become more familiar with simple exploits, web exploitation, and ARM exploitation
Are there any course requirements or prerequisites?
This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
Who this course is for:
Anyone interested in Reverse Engineering and Exploit Development
Instructor
Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.
The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.
DOWNLOAD
Code:
http://nitroflare.com/view/497BE04E71F122B/oqxsx.Reverse.Engineering.and.Exploit.Development.part1.rar
http://nitroflare.com/view/315EA6DC12F54F8/oqxsx.Reverse.Engineering.and.Exploit.Development.part2.rar
Code:
https://rapidgator.net/file/5563d13a2bca66a3b9ff562a67a7dedf/oqxsx.Reverse.Engineering.and.Exploit.Development.part1.rar
https://rapidgator.net/file/54451277efa038f0edb86ed2a1198f53/oqxsx.Reverse.Engineering.and.Exploit.Development.part2.rar
Code:
http://turbobit.net/ee1wqdddcmqc/oqxsx.Reverse.Engineering.and.Exploit.Development.part1.rar.html
http://turbobit.net/y77hcwmno94c/oqxsx.Reverse.Engineering.and.Exploit.Development.part2.rar.html