Security for Hackers and Developers: Reverse Engineering
Pluralsight
Course Summary
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.
-
+
Course Description
In the prior courses we learned there are 4 main techniques to secure code: design review, static analysis, manual audit, and dynamic (fuzz) testing. But, once the code is fielded, hackers will begin researching exploits against it. In this course, learn how and why compiled binaries are examined and scoured for weaknesses, and why reversing is also a required malware analysis skill and is sometimes needed for low-level developers working with undocumented APIs. After watching this course you'll be familiar all of the above and with the popular IDA pro tool and how to use it. Download the IDA pro demo to complete the labs.
-
+
Course Syllabus
Course Overview- 1m 38s
—Course Overview 1m 38sUsing IDA Pro to Reverse Code- 30m 35sLearning x86 and Calling Conventions- 23m 15sUnderstanding C-to-Assembly and Compiled Structures- 13m 22sPatching a Compiled Binary- 15m 24sReversing C++- 17m 3sExtending IDA with Scripts- 22m 47s