This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Exploit Writer - Became a Master in Exploit Writing & Reverse Engineering
Introduction
1. Introduction To Reversing (7:20)
2. About The Author (3:27)
3. Ethical Considerations (1:57)
4. Reversing Tools - Part 1 (5:34)
5. Reversing Tools - Part 2 (4:32)
6. Reversing Tools - Part 3 (3:09)
7. Reversing Tools - Part 4 (3:34)
8. Reversing Tools - Part 5 (4:41)
9. Reversing Tools - Part 6 (4:35)
10. How To Access Your Working Files (3:22)
2. REVERSING COMPILED WINDOWS APPLICATIONS
1. Vulnerabilities - Part 1 (5:27)
2. Vulnerabilities - Part 2 (5:43)
3. Vulnerabilities - Part 3 (4:22)
4. Using Fuzzing - Part 1 (5:41)
5. Using Fuzzing - Part 2 (5:51)
6. Using Fuzzing - Part 3 (6:52)
7. Using Fuzzing - Part 4 (6:22)
8. Just Enough Assembly - Part 1 (6:55)
9. Just Enough Assembly - Part 2 (6:55)
10. Just Enough Assembly - Part 3 (3:51)
11. Stack Overflows - Part 1 (6:07)
12 .Stack Overflows - Part 2 (6:09)
13. Stack Overflows - Part 3 (7:56)
14. Heap Overflows - Part 1 (4:46)
15. Heap Overflows - Part 2 (5:50)
16. Heap Overflows - Part 3 (3:12)
17. Heap Overflows - Part 4 (5:42)
18. Format String Bugs - Part 1 (6:43)
19. Format String Bugs - Part 2 (7:25)
20. Format String Bugs - Part 3 (7:02)
21. Format String Bugs - Part 4 (4:14)
22. Section Overflows (6:48)
23. Windows Kernel Flaws (3:32)
24. Decompilers (6:52)
25. Automation - Part 1 (5:52)
26. Automation - Part 2 (5:46)
3. REVERSING COMPILED OS X APPLICATIONS
1. Where Are The Vulnerabilities (2:28)
2. Locating Stack Overflows (3:32)
3. Heap Overflows (6:06)
4. REVERSING COMPILED LINUX APPLICATIONS
1. Where Are The Vulnerabilities (5:03)
2. Linux Stack Overflows - Part 1 (4:30)
3. Linux Stack Overflows - Part 2 (6:58)
4. Linux Stack Overflows - Part 3 (6:23)
5. Linux Stack Overflows - Part 4 (5:56)
6. Linux Stack Overflows - Part 5 (7:05)
7. Linux Heap Overflows - Part 1 (5:25)
8. Linux Heap Overflows - Part 2 (6:47)
9. Linux Heap Overflows - Part 3 (5:46)
10. Linux Heap Overflows - Part 4 (5:05)
11. Linux Kernel Flaws - Part 1 (5:36)
12. Linux Kernel Flaws - Part 2 (2:44)
5. REVERSING ANDROID APPLICATIONS
1. Introduction To Android And ARM (4:48)
2. Android Applications (3:25)
6. FINDING OTHER VULNERABILITIES
1. Web Site Vulnerabilities (5:40)
2. Database Vulnerabilities (5:04)
7. SIMPLE EXPLOITS
1. Going From Vulnerability To Exploit (2:49)
2. A Simple Exploit Script (5:50)
3. Creating A Metasploit Module For An Exploit - Part 1 (4:40)
4. Creating A Metasploit Module For An Exploit - Part 2 (6:38)
5. Creating A Metasploit Module For An Exploit - Part 3 (7:14)
8. EXPLOIT PAYLOADS
1. Shellcode - Part 1 (5:53)
2. Shellcode - Part 2 (4:58)
3. Shellcode - Part 3 (7:05)
4. Shellcode - Part 4 (3:48)
9. MAKING EXPLOITS HARDER TO DETECT
1. Encoding Shellcode - Part 1 (5:15)
2. Encoding Shellcode - Part 2 (6:02)
10. WEB EXPLOITATION
1. Web Exploits In Metasploit (4:29)
11. ARM EXPLOITATION
1. Android Exploits In Metasploit (3:45)
12. FUTURE DIRECTIONS
1. Wrap Up And Suggestions For Further Study (5:52)
10. Linux Heap Overflows - Part 4
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock