fbpx
4.12 out of 5
4.12
822 reviews on Udemy

Reverse Engineering and Exploit Development

Application Penetration Testing for Security Professionals
Instructor:
Infinite Skills
8,248 students enrolled
English [Auto-generated] More
Learn more about various reversing tools
Learn more about common vulnerabilities and how to find them
You will become more familiar with simple exploits, web exploitation, and ARM exploitation

In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

Once you have completed this computer based training course, you will be fully capable of finding vulnerabilities and developing exploits for them. Working files are included, allowing you to follow along with the author throughout the lessons.

Getting Started

1
Important - Download These First - Working Files
2
Introduction To Reversing
3
About The Author
4
Ethical Considerations
5
Reversing Tools - Part 1
6
Reversing Tools - Part 2
7
Reversing Tools - Part 3
8
Reversing Tools - Part 4
9
Reversing Tools - Part 5
10
Reversing Tools - Part 6
11
How To Access Your Working Files

Reversing Compiled Windows Applications

1
Vulnerabilities - Part 1
2
Vulnerabilities - Part 2
3
Vulnerabilities - Part 3
4
Using Fuzzing - Part 1
5
Using Fuzzing - Part 2
6
Using Fuzzing - Part 3
7
Using Fuzzing - Part 4
8
Just Enough Assembly - Part 1
9
Just Enough Assembly - Part 2
10
Just Enough Assembly - Part 3
11
Stack Overflows - Part 1
12
Stack Overflows - Part 2
13
Stack Overflows - Part 3
14
Heap Overflows - Part 1
15
Heap Overflows - Part 2
16
Heap Overflows - Part 3
17
Heap Overflows - Part 4
18
Format String Bugs - Part 1
19
Format String Bugs - Part 2
20
Format String Bugs - Part 3
21
Format String Bugs - Part 4
22
Section Overflows
23
Windows Kernel Flaws
24
Decompilers
25
Automation - Part 1
26
Automation - Part 2

Reversing Compiled OS X Applications

1
Where Are The Vulnerabilities?
2
Locating Stack Overflows
3
Heap Overflows

Reversing Compiled Linux Applications

1
Where Are The Vulnerabilities?
2
Linux Stack Overflows - Part 1
3
Linux Stack Overflows - Part 2
4
Linux Stack Overflows - Part 3
5
Linux Stack Overflows - Part 4
6
Linux Stack Overflows - Part 5
7
Linux Heap Overflows - Part 1
8
Linux Heap Overflows - Part 2
9
Linux Heap Overflows - Part 3
10
Linux Heap Overflows - Part 4
11
Linux Kernel Flaws - Part 1
12
Linux Kernel Flaws - Part 2

Reversing Android Applications

1
Introduction To Android And ARM
2
Android Applications

Finding Other Vulnerabilities

1
Web Site Vulnerabilities
2
Database Vulnerabilities

Simple Exploits

1
Going From Vulnerability To Exploit
2
A Simple Exploit Script
3
Creating A Metasploit Module For An Exploit - Part 1
4
Creating A Metasploit Module For An Exploit - Part 2
5
Creating A Metasploit Module For An Exploit - Part 3

Exploit Payloads

1
Shellcode - Part 1
2
Shellcode - Part 2
3
Shellcode - Part 3
4
Shellcode - Part 4

Making Exploits Harder To Detect

1
Encoding Shellcode - Part 1
2
Encoding Shellcode - Part 2

Web Exploitation

1
Web Exploits In Metasploit

ARM Exploitation

1
Android Exploits In Metasploit

Future Directions

1
Wrap Up And Suggestions For Further Study
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don`t have an internet connection, some instructors also let their students download course lectures. That`s up to the instructor though, so make sure you get on their good side!
4.1
4.1 out of 5
822 Ratings

Detailed Rating

Stars 5
418
Stars 4
243
Stars 3
106
Stars 2
31
Stars 1
24