Reverse Engineering And Binary Exploitation

cbicone-100x100-1
Cyber Bangla
Last Update March 25, 2024
5.0 /5
(1)
38 already enrolled

About This Course

Binary exploitation intended to change the behavior of the binary, and reverse engineering intended to understand how it works. Binary exploitation requires some reverse engineering, reverse engineering doesn’t necessarily require binary exploitation. The best example I know about it is overcoming DRM protections of media content.

Curriculum

20h

Introduction and Type of Reverse and Pwn problems

Number system and Assembly

Assembly and C comparison

Stack , registers ,flags , call conventions

Introduction to GDB and Buffer Overflow basic

Buffer overflow to flow control.

Format string vulnerability

Return 2 Libc attack

Introduction to IDA

Solving crackmes with IDA

Pyc reversing.

APK reversing

.NET binary reversing

WASM reversing

Memory scanning and debugging

Your Instructors

Cyber Bangla

4.79/5
6 Courses
34 Reviews
1387 Students
See more

Student Feedback

5.0
1 Rating
100%
0%
0%
0%
0%

Reviews (1)

Best

Write a review

1,000.001,200.00

17% off
Level
Intermediate
Duration 20 hours
Subject
Language
paid paid course revers

Course categories

Related Courses

Want to receive push notifications for all major on-site activities?

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare