Soro Posted July 8, 2012 Share Posted July 8, 2012 (edited) Understand, modify, and analyze compiled applications and systems to identify vulnerabilities Reverse Engineering 1http://vimeo.com/30076325Slides:http://pentest.cryptocity.net/files/reversing/sotirov-re-fall2011.pdfBinary:http://pentest.cryptocity.net/files/reversing/homework-re-fall2011.zip Reverse Engineering 2http://vimeo.com/30594548Slideshttp://pentest.cryptocity.net/files/reversing/2011/dynamic_reversing_2011.pdf Edited July 8, 2012 by Soro Link to comment Share on other sites More sharing options...
xsk Posted July 10, 2012 Share Posted July 10, 2012 We'll see their 2 hours 25 minutes and raise them 6 hours and 8 minutes />http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Link to comment Share on other sites More sharing options...
decrypt Posted February 17, 2013 Share Posted February 17, 2013 Thank you Link to comment Share on other sites More sharing options...
chickenbutt Posted June 25, 2013 Share Posted June 25, 2013 A.K.A. ~30 minute intro to how to not use IDA and analyze static PE by people who most likely don't stand out in the field but have degrees.. Link to comment Share on other sites More sharing options...
mizoteam Posted July 23, 2013 Share Posted July 23, 2013 Thanks for your info and tutorial>......!! Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now