The Reverse Engineering and Exploit Development training course, will teach the common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
You will start by learning about reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows. From there, we will teach them how to reverse compiled OS X, Linux, and Android applications. This course also covers how to find other vulnerabilities, including website and database vulnerabilities. Finally, you will learn about simple exploits, web exploitation, and ARM exploitation.
By attending Reverse Engineering and Exploit Development workshop, delegates will:
- Learn more about various reversing tools
- Learn more about common vulnerabilities and how to find them
- Become more familiar with simple exploits, web exploitation, and ARM exploitation
- This Reverse Engineering and Exploit Development class is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
- Anyone interested in Reverse Engineering and Exploit Development
