Application Penetration Testing for Security Professionals
Created by Infinite Skills Last updated 1/2017 English What Will I Learn?
Learn more about various reversing tools
Learn more about common vulnerabilities and how to find them
You will become more familiar with simple exploits, web exploitation, and ARM exploitation
Requirements
This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
Description
In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software
vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed
for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows
From there, Philip will teach you how to reverse compiled OS X, Linux, and Android applications. This video tutorial also covers how to
find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation
and ARM exploitation.
The Source https://www.freetutorials.eu/reverse-engineering-and-exploit-development/
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 Getting Started/001 Important - Download These First - Working Files.html
373 B
01 Getting Started/002 Introduction To Reversing.mp4
6.5 MB
01 Getting Started/003 About The Author.mp4
4.7 MB
01 Getting Started/004 Ethical Considerations.mp4
2.8 MB
01 Getting Started/005 Reversing Tools - Part 1.mp4
14.8 MB
01 Getting Started/006 Reversing Tools - Part 2.mp4
18.4 MB
01 Getting Started/007 Reversing Tools - Part 3.mp4
14.8 MB
01 Getting Started/008 Reversing Tools - Part 4.mp4
11.7 MB
01 Getting Started/009 Reversing Tools - Part 5.mp4
14.7 MB
01 Getting Started/010 Reversing Tools - Part 6.mp4
13.6 MB
01 Getting Started/011 How To Access Your Working Files.mp4
14.7 MB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files.zip
49.8 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 1/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 10/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 11/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 12/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/BufferOverflow.exe
15.2 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/check.sh
216 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/format-string.zip
5 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/formatstring.c
258 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.pl
421 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/fuzz.py
602 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heap-overflows.zip
14.6 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/heapbufferoverflow.c
212 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stack-buffer-overflows.zip
5.3 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 2/stackbufferoverflow.c
290 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-heap.c
1016 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 3/mac-stack.c
157 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap-not-vuln.c
169 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-heap.c
335 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack-fptr.c
365 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/linux-stack.c
210 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple.asm
753 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 4/simple32.asm
747 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 5/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 6/No Work Files.rtf
346 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 7/vulnserver.rb
2 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 8/shellcode.zip
2.7 KB
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/enc.sh
398 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Chapter 9/sc.sh
512 B
01 Getting Started/attached_files/001 Important - Download These First - Working Files/Reverse-Engineering-And-Exploit-Development-Working-Files/Reverse Engineering and Exploit Development - Working Files/Working Files - README.txt
256 B
02 Reversing Compiled Windows Applications/012 Vulnerabilities - Part 1.mp4
9 MB
02 Reversing Compiled Windows Applications/013 Vulnerabilities - Part 2.mp4
9.4 MB
02 Reversing Compiled Windows Applications/014 Vulnerabilities - Part 3.mp4
8.1 MB
02 Reversing Compiled Windows Applications/015 Using Fuzzing - Part 1.mp4
11.8 MB
02 Reversing Compiled Windows Applications/016 Using Fuzzing - Part 2.mp4
9.1 MB
02 Reversing Compiled Windows Applications/017 Using Fuzzing - Part 3.mp4
75.4 MB
02 Reversing Compiled Windows Applications/018 Using Fuzzing - Part 4.mp4
15.2 MB
02 Reversing Compiled Windows Applications/019 Just Enough Assembly - Part 1.mp4
21.4 MB
02 Reversing Compiled Windows Applications/020 Just Enough Assembly - Part 2.mp4
32.3 MB
02 Reversing Compiled Windows Applications/021 Just Enough Assembly - Part 3.mp4
19.3 MB
02 Reversing Compiled Windows Applications/022 Stack Overflows - Part 1.mp4
6.2 MB
02 Reversing Compiled Windows Applications/023 Stack Overflows - Part 2.mp4
9.1 MB
02 Reversing Compiled Windows Applications/024 Stack Overflows - Part 3.mp4
33.8 MB
02 Reversing Compiled Windows Applications/025 Heap Overflows - Part 1.mp4
6.9 MB
02 Reversing Compiled Windows Applications/026 Heap Overflows - Part 2.mp4
31.6 MB
02 Reversing Compiled Windows Applications/027 Heap Overflows - Part 3.mp4
6.9 MB
02 Reversing Compiled Windows Applications/028 Heap Overflows - Part 4.mp4
39.5 MB
02 Reversing Compiled Windows Applications/029 Format String Bugs - Part 1.mp4
16.1 MB
02 Reversing Compiled Windows Applications/030 Format String Bugs - Part 2.mp4
45.1 MB
02 Reversing Compiled Windows Applications/031 Format String Bugs - Part 3.mp4
48.5 MB
02 Reversing Compiled Windows Applications/032 Format String Bugs - Part 4.mp4
7.1 MB
02 Reversing Compiled Windows Applications/033 Section Overflows.mp4
36.1 MB
02 Reversing Compiled Windows Applications/034 Windows Kernel Flaws.mp4
4.9 MB
02 Reversing Compiled Windows Applications/035 Decompilers.mp4
18 MB
02 Reversing Compiled Windows Applications/036 Automation - Part 1.mp4
12.3 MB
02 Reversing Compiled Windows Applications/037 Automation - Part 2.mp4
9.9 MB
03 Reversing Compiled OS X Applications/038 Where Are The Vulnerabilities.mp4
1.9 MB
03 Reversing Compiled OS X Applications/039 Locating Stack Overflows.mp4
3.6 MB
03 Reversing Compiled OS X Applications/040 Heap Overflows.mp4
14.8 MB
04 Reversing Compiled Linux Applications/041 Where Are The Vulnerabilities.mp4
4.6 MB
04 Reversing Compiled Linux Applications/042 Linux Stack Overflows - Part 1.mp4
6.6 MB
04 Reversing Compiled Linux Applications/043 Linux Stack Overflows - Part 2.mp4
21.3 MB
04 Reversing Compiled Linux Applications/044 Linux Stack Overflows - Part 3.mp4
26.8 MB
04 Reversing Compiled Linux Applications/045 Linux Stack Overflows - Part 4.mp4
27.5 MB
04 Reversing Compiled Linux Applications/046 Linux Stack Overflows - Part 5.mp4
25.8 MB
04 Reversing Compiled Linux Applications/047 Linux Heap Overflows - Part 1.mp4
27.6 MB
04 Reversing Compiled Linux Applications/048 Linux Heap Overflows - Part 2.mp4
25.5 MB
04 Reversing Compiled Linux Applications/049 Linux Heap Overflows - Part 3.mp4
35.5 MB
04 Reversing Compiled Linux Applications/050 Linux Heap Overflows - Part 4.mp4
25.3 MB
04 Reversing Compiled Linux Applications/051 Linux Kernel Flaws - Part 1.mp4
10.1 MB
04 Reversing Compiled Linux Applications/052 Linux Kernel Flaws - Part 2.mp4
5.1 MB
05 Reversing Android Applications/053 Introduction To Android And ARM.mp4