Introduction
Introduction Statistics Contact Development Disclaimer Help
Day 1 Part 1: Introduction to Reverse Engineering Software
by Matt Briggs
Thumbnail
Download
Web page
Get the class materials to follow along at
http://www.OpenSecurityTraining.info/IntroductionToReverseEn
gineering.html
Follow us on Twitter for class news @OpenSecTraining
or via RSS at
http://www.OpenSecurityTraining.info/ChangeB
log/ChangeBlog.html
Throughout the history of invention curious minds have
sought to understand the inner workings of their gadgets.
Whether investigating a broken watch, or improving an
engine, these people have broken down their goods into
their elemental parts to understand how they work. This
is Reverse Engineering (RE), and it is done every day
from recreating outdated and incompatible software,
understanding malicious code, or exploiting weaknesses in
software.
In this course by Matt Briggs, we will explore what
drives people to reverse engineer software and the
methodology and tools used to do it.
Topics include, but are not limited to:
* Uses for RE
* The tricks and pitfalls of analyzing compiled code
* Identifying calling conventions
* How to navigate x86 assembly using IDA Pro
* Identifying Control Flows
* Identifying the Win32 API
* Using a debugger to aid RE
* Dynamic Analysis tools and techniques for RE
During the course students will complete many hands on
exercises.
Introductory Intel x86
(http://www.OpenSecurityTraining.info/IntroX86.html) is a
direct and very necessary prerequisite which should be
taken before this class. This class will serve as a
prerequisite for a later class on malware static
analysis.
Date Published: 2012-07-08 00:17:04
Identifier: Day1Part1IntroductionToReverseEngineeringSoftware
Item Size: 1351326808
Media Type: movies
# Topics
OpenSecurityTraining.info; Disassembl...
# Collections
opensecuritytraining
computersandtechvideos
# Uploaded by
@opensecuritytraining_info
# Similar Items
View similar items
PHAROS
You are viewing proxied material from tilde.pink. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.