Introduction
Introduction Statistics Contact Development Disclaimer Help
2013 Day 1 Part 9 Introduction To Reverse Engineering Software - Ph...
by Frank Poz
Thumbnail
Download
Web page
Get the class materials to follow along at
http://www.OpenSecurityTraining.info/IntroductionToReverseEn
gineering.html[1]
Follow us on Twitter for class news @OpenSecTraining
or via RSS at
http://www.OpenSecurityTraining.info/ChangeB
log/ChangeBlog.html[2]
Throughout the history of invention curious minds have
sought to understand the inner workings of their gadgets.
Whether investigating a broken watch, or improving an
engine, these people have broken down their goods into
their elemental parts to understand how they work. This
is Reverse Engineering (RE), and it is done every day
from recreating outdated and incompatible software,
understanding malicious code, or exploiting weaknesses in
software.
In this course by Frank Poz, we will explore what drives
people to reverse engineer software and the methodology
and tools used to do it.
Topics include, but are not limited to:
* Uses for RE
* The tricks and pitfalls of analyzing compiled code
* Identifying calling conventions
* How to navigate x86 assembly using IDA Pro
* Identifying Control Flows
* Identifying the Win32 API
* Using a debugger to aid RE
* Dynamic Analysis tools and techniques for RE
During the course students will complete many hands on
exercises.
Introductory Intel x86
(http://www.OpenSecurityTraining.info/IntroX86.html[3])
is a direct and very necessary prerequisite which should
be taken before this class. This class will serve as a
prerequisite for a later class on malware static analysis.
References
1. http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html …
2. http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html (link)
3. http://www.OpenSecurityTraining.info/IntroX86.html (link)
Date Published: 2013-09-30 04:48:05
Identifier: 2013Day1Part9IntroductionToReverseEngineeringSoftware
Item Size: 502369213
Media Type: movies
# Topics
OpenSecurityTraining.info
Disassembly
Reverse Engineering
IDA
IDA Pro
Debugging
Intel
x86
Intel x86
IA32
Computer security class
Computer Security
Cyber Security
CyberSecurity
Host Security
Training
Education
Multi-day-class
Multi-day-training
Classes
Computer
Computers
Security
Technology
malware
# Collections
opensource_movies
community
# Uploaded by
@opensecuritytraining_info
# Similar Items
View similar items
PHAROS
You are viewing proxied material from tilde.pink. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.