Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you’ll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.
Author Name: Dr. Jared DeMott
Author Description:
Dr. Jared DeMott is an engineer, entrepreneur, and security leader. DeMott previously served as a vulnerability analyst with the NSA. He holds a PhD from Michigan State University. He regularly speaks on cyber matters at conferences like RSA, DerbyCon, BlackHat, ToorCon, GrrCon, HITB, etc. He was a finalist in Microsoft’s BlueHat prize contest, which helped make Microsoft customers more secure. Dr. DeMott has been on three winning Defcon capture-the-flag teams, and has been an invited lecturer … more
Table of Contents
- Course Overview
1min - Using IDA Pro to Reverse Code
30mins - Learning x86 and Calling Conventions
23mins - Understanding C-to-Assembly and Compiled Structures
13mins - Patching a Compiled Binary
15mins - Reversing C++
17mins - Extending IDA with Scripts
22mins
There are no reviews yet.