Reverse Engineering Win32 Applications

Reverse Engineering Win32 Applications
English | Size: 2.99 GB
Category: Tutorial

This course will familiarize students with all aspects of reverse engineering (reversing) Windows 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Windows software. These flaws include, but are not limited to, buffer overflow, heap overflows, format string flaws, section overflows, and kernel flaws. Along the way students will gain a better understanding of how Windows 32-bit applications work and will be exposed to a number of common reversing tools such as specialized debuggers (IDA Pro) and fuzzers. As always, you will also learn how to leverage Python and other scripting tools in order to automate the discovery and exploitation of software flaws. [Read more…]

PentesterAcademy – Reverse Engineering Linux 32-bit Applications

PentesterAcademy – Reverse Engineering Linux 32-bit Applications
English | Size: 2.44 GB
Category: CBTs

This course will familiarize students with all aspects of reverse engineering (reversing) Linux 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Linux software. These flaws include, but are not limited to, buffer overflow, heap overflows, format string flaws, section overflows, and kernel flaws. Along the way students will gain a better understanding of how Linux 32-bit applications work and will be exposed to a number of common reversing tools such as specialized debuggers (IDA Pro) and fuzzers. As always, you will also learn how to leverage Python and other scripting tools in order to automate the discovery and exploitation of software flaws. [Read more…]

ZDResearch Reverse Engineering (sections 1-4 of 5)

ZDResearch Reverse Engineering (sections 1-4 of 5)
English | Size: 873.1 MB
Category: Tutorial

ZDResearch Reverse Engineering (sections 1-4 of 5)
Reverse engineering is the art of understanding machine code and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like s/he has access to the source code. This course teaches you to be an expert reverse engineer.
[Read more…]

Alex Korb – The Upward Spiral Using Neuroscience to Reverse the Course of Depression, One Small Change at a Time

Alex Korb – The Upward Spiral: Using Neuroscience to Reverse the Course of Depression, One Small Change at a Time
English | Size: 307.08 MB
Category: Psychology / Body Language

Depression can feel like a downward spiral, pulling you into a vortex of sadness, fatigue, and apathy. In The Upward Spiral, neuroscientist Alex Korb demystifies the intricate brain processes that cause depression and offers a practical and effective approach to getting better. Based on the latest research in neuroscience, this book provides dozens of straightforward tips you can do every day to rewire your brain and create an upward spiral towards a happier, healthier life. [Read more…]

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA
English | Size: 201.63 MB
Category: Tutorial

Ransomware is a growing threat, and it’s imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomware- the devastating WannaCry malware-using this case study to help you better understand how malware functions.
[Read more…]

Pluralsight – Security for Hackers and Developers – Reverse Engineering

Pluralsight – Security for Hackers and Developers – Reverse Engineering
English | Size: 302.47 MB
Category: Tutorial

In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it.
[Read more…]

Harlan Kilstein – Reverse SEO Method 2017 + OTO

Harlan Kilstein – Reverse SEO Method 2017 + OTO
English | Size: 1.56 GB
Category: Business

Week One: Which are the best niches for the Reverse SEO Method?
How to Research
How to Test
Secret Method [Don’t Share] (How To Study What’s Really Going On In the Niche)
Week Two: Installing The Theme And Site Set Up
What if you Want To Use A Mobile Theme
The Plugins You’ll Need
Simple or Drop Dead Simple. Which One Is Right For You?
Minimal Content or Zero Content – Which One Is Right For You?
[Read more…]

SANS FOR610 Reverse Engineering Malware

SANS FOR610 Reverse Engineering Malware
English | Size: 6.43 GB
Category: Tutorial

This malware analysis course prepares forensic investigators, incident responders, and malware specialists to reverse-engineer malicious software using practical tools and techniques.

This popular malware analysis course has helped forensic investigators, malware specialists, incident responders, and IT administrators assess malware threats. The course teaches a practical approach to examining malicious programs-spyware, bots, trojans, etc.-that target or run on Microsoft Windows. This training also looks at reversing Web-based malware, such as javascript and Flash files, as well as malicious document files. By the end of the course, you’ll learn how to reverse-engineer malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and other tools for turning malware inside-out!
[Read more…]

Skip to toolbar