[FreeCoursesOnline.Me] [PentesterAcademy] Reverse Engineering Linux 32-Bit Applications [FCO]

Torrent Details


[FreeCoursesOnline.Me] [PentesterAcademy] Reverse Engineering Linux 32-bit Applications [FCO]

NAME
[FreeCoursesOnline.Me] [PentesterAcademy] Reverse Engineering Linux 32-bit Applications [FCO].torrent
CATEGORY
Other
INFOHASH
d09ef5c9d32edc5cf5471270df634ceac9c7bae9
SIZE
2.7 GB in 49 files
ADDED
Uploaded on 20-03-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description





Created by: Dr. Philip Polstra

Language: English

Torrent Contains: 51 Files

Course Source: https://www.pentesteracademy.com/course?id=40



Description



This course will familiarize students with all aspects of reverse engineering (reversing) Linux 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Linux software. These flaws include, but are not limited to, buffer overflow, heap overflows, format string flaws, section overflows, and kernel flaws. Along the way students will gain a better understanding of how Linux 32-bit applications work and will be exposed to a number of common reversing tools such as specialized debuggers (IDA Pro) and fuzzers.  As always, you will also learn how to leverage Python and other scripting tools in order to automate the discovery and exploitation of software flaws.



About Author



Dr. Philip Polstra (Dr. Phil) has been involved with technology since an early age. He and one of his brothers cleaned out their savings to purchase a TI-99/4a computer in the early 80’s, much to the chagrin of his parents. He has been tinkering with computers and electronics ever since. Phil is an internationally recognized hardware hacker and information security expert. He has made repeat appearances at several of the top conferences worldwide. Here are just a few of the conferences he has spoken at: DEFCON (six times in four years), Blackhat, 44CON, GrrCON, BruCon, ForenSecure, SecTOR, c0c0n, Shakacon, B-sides Detroit, and B-sides Iowa. His work on developing small affordable hacking devices is documented in the book “Hacking and Penetration Testing with Low Power Devices”. He is also known for his work on USB hacking and forensics. Phil has published several articles on USB-related topics.



Phil is an Associate Professor in the department of Math, Computer Science, and Statistics at Bloomsburg University of Pennsylvania where he teaches Digital Forensics. His current research focus is on developing ultra-low-power hacking hardware. Phil also performs security penetration tests and forensic investigations on a consulting basis. His book “Linux Forensics” is considered a must have by a number of people in the forensics and information security community.



For More Udemy Free Courses >>> https://ftuforum.com/

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.ftuforum.com/







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
Discuss.FTUForum.com.html31.9 KB
FreeCoursesOnline.Me.html108.3 KB
FTUForum.com.html100.4 KB
How you can help Team-FTU.txt235 B
lin32-rev001-courseIntroduction.mp461.2 MB
lin32-rev002-gettingStarted.mp4228 MB
lin32-rev003-evansDebugger.mp433.3 MB
lin32-rev004-gdbDebugger.mp421.3 MB
lin32-rev005-idaPro.mp446.7 MB
lin32-rev006-bitOfAssemblyp1.mp419.2 MB
lin32-rev007-bitOfAssemblyp2.mp436.3 MB
lin32-rev008-bitOfAssemblyp3.mp423.5 MB
lin32-rev009-bitOfAssemblyp4.mp473.7 MB
lin32-rev010-stackBufferOverflowsP1.mp419.4 MB
lin32-rev011-stackBufferOverflowsP2.mp449 MB
lin32-rev012-stackBufferOverflowsP3.mp418.8 MB
lin32-rev013-stackBufferOverflowsP4.mp427.2 MB
lin32-rev014-stackBufferOverflowsP5.mp472.1 MB
lin32-rev015-stackBufferOverflowsP6.mp458.6 MB
lin32-rev016-stackBufferOverflowsP7.mp482.4 MB
lin32-rev017-stackBufferOverflowsP8.mp491 MB
lin32-rev018-stackBufferOverflowsP9.mp440.8 MB
lin32-rev019-stackBufferOverflowsP10.mp4117.5 MB
lin32-rev020-stackBufferOverflowsP11.mp434.7 MB
lin32-rev021-heapBufferOverflowsP1.mp433.5 MB
lin32-rev022-heapBufferOverflowsP2.mp4145.9 MB
lin32-rev023-heapBufferOverflowsP3.mp485.6 MB
lin32-rev024-heapBufferOverflowsP4.mp4114 MB
lin32-rev025-heapBufferOverflowsP5.mp4138.5 MB
lin32-rev026-formatStringsP1.mp433.5 MB
lin32-rev027-formatStringsP2.mp459.2 MB
lin32-rev028-formatStringsP3.mp4124.1 MB
lin32-rev029-formatStringsP4.mp495.7 MB
lin32-rev030-formatStringsP5.mp482.2 MB
lin32-rev031-kernelFlawsP1.mp443.2 MB
lin32-rev032-kernelFlawsP2.mp428.9 MB
lin32-rev033-malwareP1.mp421.2 MB
lin32-rev034-malwareP2.mp457.8 MB
lin32-rev035-malwareP3.mp441 MB
lin32-rev036-malwareP4.mp471.8 MB
lin32-rev037-malwareP5.mp4101 MB
lin32-rev038-malwareP6.mp423.6 MB
lin32-rev039-malwareP7.mp437.1 MB
lin32-rev040-malwareP8.mp455.2 MB
lin32-rev041-malwareP9.mp487.8 MB
lin32-rev042-malwareP10.mp443 MB
lin32-rev043-malwareP11.mp471.6 MB
lin32-rev044-wrapup.mp454.4 MB
Reverse Engineering Linux 32-bit Applications.zip3.6 KB

Alternative Torrents for 'FreeCoursesOnline.Me PentesterAcademy Reverse Engineering Linux bit Applications FCO'.

There are no alternative torrents found.