English | Size: 1.4 GB
Genre: eLearning
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer. In the previous courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will start researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you’ll be familiar with all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.
Syllabus
Using IDA Pro to Reverse Code
Learning x86 and Calling Conventions
Understanding C-to-Assembly and Compiled Structures
Patching a Compiled Binary
Reversing C++
Extending IDA with Scripts
rapidgator.net/file/77787b77aa5e108ceaaebef50e57b974/SecurityforHackersandDevelopers.part1.rar.html
rapidgator.net/file/ae34d374482911d258dc534745d3ab0a/SecurityforHackersandDevelopers.part2.rar.html
rapidgator.net/file/10679a9cd644ff1dea174d93e43e1991/SecurityforHackersandDevelopers.part3.rar.html
rapidgator.net/file/5800815bacdc433d272b86b23fa34d90/SecurityforHackersandDevelopers.part4.rar.html
rapidgator.net/file/b602b25f210183f0613f7b89e1d1acd3/SecurityforHackersandDevelopers.part5.rar.html
tbit.to/jffypukamadn/SecurityforHackersandDevelopers.part1.rar.html
tbit.to/iw6uzi7t9tpc/SecurityforHackersandDevelopers.part2.rar.html
tbit.to/aanu3zaxzjmt/SecurityforHackersandDevelopers.part3.rar.html
tbit.to/0twyiyn19zkh/SecurityforHackersandDevelopers.part4.rar.html
tbit.to/tcgnqo2du2d1/SecurityforHackersandDevelopers.part5.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9