Friday, 4 May 2018

Reverse Engineering and Exploit Development Video Course DVD


Duration : 6 hours
82 Video Lessons
Working Files : Yes

Getting Started
Important - Download These First - Working Files
Introduction To Reversing
About The Author
Ethical Considerations
Reversing Tools - Part 1
Reversing Tools - Part 2
Reversing Tools - Part 3
Reversing Tools - Part 4
Reversing Tools - Part 5
Reversing Tools - Part 6
How To Access Your Working Files
Reversing Compiled Windows Applications
Vulnerabilities - Part 1
Vulnerabilities - Part 2
Vulnerabilities - Part 3
Using Fuzzing - Part 1
Using Fuzzing - Part 2
Using Fuzzing - Part 3
Using Fuzzing - Part 4
Just Enough Assembly - Part 1
Just Enough Assembly - Part 2
Just Enough Assembly - Part 3
Stack Overflows - Part 1
Stack Overflows - Part 2
Stack Overflows - Part 3
Heap Overflows - Part 1
Heap Overflows - Part 2
Heap Overflows - Part 3
Heap Overflows - Part 4
Format String Bugs - Part 1
Format String Bugs - Part 2
Format String Bugs - Part 3
Format String Bugs - Part 4
Section Overflows
Windows Kernel Flaws
Decompilers
Automation - Part 1
Automation - Part 2
Reversing Compiled OS X Applications
Where Are The Vulnerabilities?
Locating Stack Overflows
Heap Overflows
Reversing Compiled Linux Applications
Where Are The Vulnerabilities?
Linux Stack Overflows - Part 1
Linux Stack Overflows - Part 2
Linux Stack Overflows - Part 3
Linux Stack Overflows - Part 4
Linux Stack Overflows - Part 5
Linux Heap Overflows - Part 1
Linux Heap Overflows - Part 2
Linux Heap Overflows - Part 3
Linux Heap Overflows - Part 4
Linux Kernel Flaws - Part 1
Linux Kernel Flaws - Part 2
Reversing Android Applications
Introduction To Android And ARM
Android Applications
Finding Other Vulnerabilities
Web Site Vulnerabilities
Database Vulnerabilities
Simple Exploits
Going From Vulnerability To Exploit
A Simple Exploit Script
Creating A Metasploit Module For An Exploit - Part 1
Creating A Metasploit Module For An Exploit - Part 2
Creating A Metasploit Module For An Exploit - Part 3
Exploit Payloads
Shellcode - Part 1
Shellcode - Part 2
Shellcode - Part 3
Shellcode - Part 4
Making Exploits Harder To Detect
Encoding Shellcode - Part 1
Encoding Shellcode - Part 2
Web Exploitation
Web Exploits In Metasploit
ARM Exploitation
Android Exploits In Metasploit
Future Directions
Wrap Up And Suggestions For Further Study

No comments:

Post a Comment