Security for Hackers and Developers: Reverse Engineering
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.
Syllabus
- Course Overview 1min
- Using IDA Pro to Reverse Code 30mins
- Learning x86 and Calling Conventions 23mins
- Understanding C-to-Assembly and Compiled Structures 13mins
- Patching a Compiled Binary 15mins
- Reversing C++ 17mins
- Extending IDA with Scripts 22mins
Taught by
Dr. Jared DeMott
Related Courses
How to Use IDA (BSWJ)Cybrary CNIT 126: Practical Malware Analysis
CNIT - City College of San Francisco via Independent Reverse Engineering for Beginners
begin.re via Independent Reverse Engineering Linux 32-bit Applications
PentesterAcademy IDA Pro Concepts and Basic Functionality
Pluralsight