09 Reverse Engineering

Course Description

Reverse engineering is the science of disassembling a compiled program, and understanding it’s workings, architecture, elements and vulnerabilities. In security, reverse engineering is used to identify bugs and vulnerabilities in software, and to craft attacks such as buffer overflows. This course will guide a student through these activities in a practical manner. We will take control of a program through a buffer overflow and inject malicious code into processes manually.

After this course the student will understand the inner anatomy of an exploit, at the level of CPU registers and Memory.

Who is this course for?

  • Cybersecurity professionals
  • White hat hackers
  • Software engineers
  • IT professionals 
  • Software debuggers
  • Software testers
  • Penetration testers

course stats

  • Active broadband internet connection
  • RAM : Min 4GB, Preferred 16GB
  • 50GB Free hard disk Space
  • Suggested Hardware : 2 monitors (one for your exercises, and one to keep this course window open). A single monitor will work fine just as well.

What you will learn

  • Setting up your environment
  • Using debugging tools on Windows and Linux
  • Introduction to processor registers
  • Machine instructions
  • Reversing your first program
  • The Stack
  • Smashing the stack
  • Buffer overflow exploit

Professional prospects

This course stands as a foundation course for the following professional applications. 

  • Penetration tester
  • Cybersecurity Auditor
  • Software security auditor
  • Exploit developer
  • Bug bounty hunter
  • Application tester
Current Status
Not Enrolled
Get Started
This course is currently closed

This course includes :

Questions before purchasing this course?

No worries, Send us a quick message and we will be happy to answer any questions you have.