Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Reverse Engineering and Exploit Development

( Duration: 2 Days )

The Reverse Engineering and Exploit Development training course, will teach the common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, we will teach them how to reverse compiled OS X, Linux, and Android applications. This course also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.

By attending Reverse Engineering and Exploit Development workshop, delegates will:

  • Learn more about various reversing tools
  • Learn more about common vulnerabilities and how to find them
  • Become more familiar with simple exploits, web exploitation, and ARM exploitation

  • This Reverse Engineering and Exploit Development class is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.

  • Anyone interested in Reverse Engineering and Exploit Development

COURSE AGENDA

1

Getting Started

  • Introduction To Reversing
  • Ethical Considerations
  • Reversing Tools
  • How To Access delegates Working Files
2

Reversing Compiled Windows Applications

  • Vulnerabilities
  • Using Fuzzing
  • Just Enough Assembly
  • Stack Overflows
  • Heap Overflows
  • Format String Bugs
  • Section Overflows
  • Windows Kernel Flaw
  • Decompilers
  • Automation
3

Reversing Compiled OS X Applications

  • Where Are The Vulnerabilities?
  • Locating Stack Overflows
  • Heap Overflows
4

Reversing Compiled Linux Applications

  • Where Are The Vulnerabilities?
  • Linux Stack Overflows
  • Linux Heap Overflows
  • Linux Kernel Flaws
5

Reversing Android Applications

  • Introduction To Android And ARM
  • Android Applications
6

Finding Other Vulnerabilities

  • Web Site Vulnerabilities
  • Database Vulnerabilities
7

Simple Exploits

  • Going From Vulnerability To Exploit
  • A Simple Exploit Script
  • Creating A Metasploit Module For An Exploit
8

Exploit Payloads

  • Shellcode
9

Making Exploits Harder To Detect

  • Encoding Shellcode
10

Web Exploitation

  • Web Exploits In Metasploit
11

ARM Exploitation

  • Android Exploits In Metasploit
12

Future Directions

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X