Reverse Engineering And Binary Exploitation

cbicone-100x100-1
Cyber Bangla
Last Update March 25, 2024
5.0 /5
(1)
38 already enrolled

About This Course

Binary exploitation intended to change the behavior of the binary, and reverse engineering intended to understand how it works. Binary exploitation requires some reverse engineering, reverse engineering doesn’t necessarily require binary exploitation. The best example I know about it is overcoming DRM protections of media content.

Curriculum

20h

Introduction and Type of Reverse and Pwn problems

Number system and Assembly

Assembly and C comparison

Stack , registers ,flags , call conventions

Introduction to GDB and Buffer Overflow basic

Buffer overflow to flow control.

Format string vulnerability

Return 2 Libc attack

Introduction to IDA

Solving crackmes with IDA

Pyc reversing.

APK reversing

.NET binary reversing

WASM reversing

Memory scanning and debugging

Your Instructors

Cyber Bangla

4.78/5
7 Courses
37 Reviews
1616 Students
See more

Student Feedback

5.0
1 Rating
100%
0%
0%
0%
0%

Reviews (1)

Best

1,000.001,200.00

17% off
Level
Intermediate
Duration 20 hours
Subject
Language
paid paid course revers

Course categories

Related Courses

-50%
Professional SOC Analyst Live Course
Professional SOC Analyst Live Course

7,499.0014,999.00

-60%
WhatsApp Image 2023-08-13 at 2.20.10 PM
-90%
_BDSEC Forensic (2)
Cyber Security For Everyone

99.00999.00

Don't have an account yet? Sign up for free