Home / Course catalog / Exploit Development and Reverse Engineering

Hacking

Exploit Development and Reverse Engineering


Description
Developing exploits for dangerous vulnerabilities is always a changing task and it requires a lot more skills. Exploit Development course techs the skills that required to analyze and the vulnerabilities and develop the tools, analyze the bugs, and write complex and relevant exploits against the modern operating system and software.

Skilled Exploit Writers from Ethical Hackers Academy developed a master level exploit development course to make it a simple and effective way of approach to learning exploit development easy with in-depth reverse engineering module to break down the vulnerability and sophisticated malware threats.

The exploit development course focusing on the most common vulnerabilities that affect the major vendors related to Operating system enterprise software, endpoints, smartphones, critical networks, government networks, and more.

The Exploit development and reverse engineering course start from basic to advanced level in which you will learn reversing compiled Windows applications, including using fuzzing, stack overflows, and heap overflows, shellcode, creating a module for Metasploit, in the end, you will be able to obtain deep skills to write exploits for web-based vulnerabilities database vulnerabilities, Linux kernel bugs, windows bugs and more.

Exploit development course focus to write an exploit for the most dangerous Windows vulnerabilities such as Remote Code Exploitation, buffer overflow, Scripting Engine Memory Corruption, Elevation of Privilege, Information Disclosure, and Memory Corruption vulnerabilities.

Continue To Order: https://ethicalhackersacademy.com/produc...

Content
  • 1. Introduction
  • 1. Introduction To Reversing.mp4
  • 2. About The Author.mp4
  • 3. Ethical Considerations.mp4
  • 4. Reversing Tools - Part 1.mp4
  • 5. Reversing Tools - Part 2.mp4
  • 6. Reversing Tools - Part 3.mp4
  • 7. Reversing Tools - Part 4.mp4
  • 8. Reversing Tools - Part 5.mp4
  • 9. Reversing Tools - Part 6.mp4
  • 10. How To Access Your Working Files.mp4
  • 2. Reversing Compiled Windows Applications
  • 1. Vulnerabilities - Part 1.mp4
  • 2. Vulnerabilities - Part 2.mp4
  • 3. Vulnerabilities - Part 3.mp4
  • 4. Using Fuzzing - Part 1.mp4
  • 5. Using Fuzzing - Part 2.mp4
  • 6. Using Fuzzing - Part 3.mp4
  • 7. Using Fuzzing - Part 4.mp4
  • 8. Just Enough Assembly - Part 1.mp4
  • 9. Just Enough Assembly - Part 2.mp4
  • 10. Just Enough Assembly - Part 3.mp4
  • 11. Stack Overflows - Part 1.mp4
  • 12 .Stack Overflows - Part 2.mp4
  • 13. Stack Overflows - Part 3.mp4
  • 14. Heap Overflows - Part 1.mp4
  • 15. Heap Overflows - Part 2.mp4
  • 16. Heap Overflows - Part 3.mp4
  • 17. Heap Overflows - Part 4.mp4
  • 18. Format String Bugs - Part 1.mp4
  • 19. Format String Bugs - Part 2.mp4
  • 20. Format String Bugs - Part 3.mp4
  • 21. Format String Bugs - Part 4.mp4
  • 22. Section Overflows.mp4
  • 23. Windows Kernel Flaws.mp4
  • 24. Decompilers.mp4
  • 25. Automation - Part 1.mp4
  • 26. Automation - Part 2.mp4
  • 3. Reversing Compiled OS X Applications
  • 1. Where Are The Vulnerabilities.mp4
  • 2. Locating Stack Overflows.mp4
  • 3. Heap Overflows.mp4
  • 4. Reversing Compiled Linux Applications
  • 1. Where Are The Vulnerabilities.mp4
  • 2. Linux Stack Overflows - Part 1.mp4
  • 3. Linux Stack Overflows - Part 2.mp4
  • 4. Linux Stack Overflows - Part 3.mp4
  • 5. Linux Stack Overflows - Part 4.mp4
  • 6. Linux Stack Overflows - Part 5.mp4
  • 7. Linux Heap Overflows - Part 1.mp4
  • 8. Linux Heap Overflows - Part 2.mp4
  • 9. Linux Heap Overflows - Part 3.mp4
  • 10. Linux Heap Overflows - Part 4.mp4
  • 11. Linux Kernel Flaws - Part 1.mp4
  • 12. Linux Kernel Flaws - Part 2.mp4
  • 5. Reversing Android Applications
  • 1. Introduction To Android And ARM.mp4
  • 2. Android Applications.mp4
  • 6. Finding Other Vulnerabilities
  • 1. Web Site Vulnerabilities.mp4
  • 2. Database Vulnerabilities.mp4
  • 7. Simple Exploits
  • 1. Going From Vulnerability To Exploit.mp4
  • 2. A Simple Exploit Script.mp4
  • 3. Creating A Metasploit Module For An Exploit - Part 1.mp4
  • 4. Creating A Metasploit Module For An Exploit - Part 2.mp4
  • 5. Creating A Metasploit Module For An Exploit - Part 3.mp4
  • 8. Exploit Payloads
  • 1. Shellcode - Part 1.mp4
  • 2. Shellcode - Part 2.mp4
  • 3. Shellcode - Part 3.mp4
  • 4. Shellcode - Part 4.mp4
  • 9. Making Exploits Harder To Detect
  • 1. Encoding Shellcode - Part 1.mp4
  • 2. Encoding Shellcode - Part 2.mp4
  • 10. Web Exploitation
  • 1. Web Exploits In Metasploit.mp4
  • 11. ARM Exploitation
  • 1. Android Exploits In Metasploit.mp4
  • 12. Future Directions
  • 1. Wrap Up And Suggestions For Further Study.mp4
Completion rules
  • All units must be completed