Posted July 8, 201213 yr Understand, modify, and analyze compiled applications and systems to identify vulnerabilities Reverse Engineering 1http://vimeo.com/30076325Slides:http://pentest.cryptocity.net/files/reversing/sotirov-re-fall2011.pdfBinary:http://pentest.cryptocity.net/files/reversing/homework-re-fall2011.zip Reverse Engineering 2http://vimeo.com/30594548Slideshttp://pentest.cryptocity.net/files/reversing/2011/dynamic_reversing_2011.pdf Edited July 8, 201213 yr by Soro
July 10, 201213 yr We'll see their 2 hours 25 minutes and raise them 6 hours and 8 minutes />http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html
June 25, 201312 yr A.K.A. ~30 minute intro to how to not use IDA and analyze static PE by people who most likely don't stand out in the field but have degrees..
Create an account or sign in to comment