Jump to content
Tuts 4 You

Recommended Posts

Posted (edited)

Understand, modify, and analyze compiled applications and systems to identify vulnerabilities

Reverse Engineering 1

http://vimeo.com/30076325

Slides:

http://pentest.cryptocity.net/files/reversing/sotirov-re-fall2011.pdf

Binary:

http://pentest.cryptocity.net/files/reversing/homework-re-fall2011.zip

Reverse Engineering 2

http://vimeo.com/30594548

Slides

http://pentest.cryptocity.net/files/reversing/2011/dynamic_reversing_2011.pdf
Edited by Soro
Posted

We'll see their 2 hours 25 minutes and raise them 6 hours and 8 minutes ;)


/>http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html

  • 7 months later...
  • 4 months later...
chickenbutt
Posted

A.K.A. ~30 minute intro to how to not use IDA and analyze static PE by people who most likely don't stand out in the field but have degrees..

  • 4 weeks later...
Posted

Thanks for your info and tutorial>......!!


Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...