:Search:

Reverse Engineering Linux 32-bit Applications - Pentester Academy

Torrent:
Info Hash: 64B0F7470A1F0A2073B9168642F5D2A43662C508
Similar Posts:
Uploader: Anonymous
Source: TP Logo The Pirate Bay
Downloads: 4
Description:
Overview This course will familiarize students with all aspects of reverse engineering (reversing) Linux 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Linux software. These flaws include, but are not limited to, buffer overflow, heap overflows, format string flaws, section overflows, and kernel flaws. Along the way students will gain a better understanding of how Linux 32-bit applications work and will be exposed to a number of common reversing tools such as specialized debuggers (IDA Pro) and fuzzers. As always, you will also learn how to leverage Python and other scripting tools in order to automate the discovery and exploitation of software flaws. Syllabus Course Introduction Getting Started Evan's Debugger GDB Debugger IDA Pro A Little Bit of Assembly Part 1 A Little Bit of Assembly Part 2 A Little Bit of Assembly Part 3 A Little Bit of Assembly Part 4 Stack Buffer Overflows Part 1: The Basics Stack Buffer Overflows Part 2: A Simple Example Stack Buffer Overflows Part 3: Stack Protection Stack Buffer Overflows Part 4: Calculating Offsets Stack Buffer Overflows Part 5: JMP ESP Stack Buffer Overflows Part 6: More Stack Protection Stack Buffer Overflows Part 7: Return to Libc Stack Buffer Overflows Part 8: Chaining Return to Libc Stack Buffer Overflows Part 9: ASLR and the PLT Stack Buffer Overflows Part 10: GOT Overwrite and Dereference Stack Buffer Overflows Part 11: Stack Canaries and Summary Heap Buffer Overflows Part 1: Heap Basics Heap Buffer Overflows Part 2: Simple Examples Heap Buffer Overflows Part 3: Simple Examples Continued Heap Buffer Overflows Part 4: More Examples Heap Buffer Overflows Part 5: Still More Examples Format String Flaws Part 1: The Basics Format String Flaws Part 2: Crashing Programs Format String Flaws Part 3: Reading Data From the Stack Format String Flaws Part 4: Reading Arbitrary Memory Locations Format String Flaws Part 5: Writing to Arbitrary Memory Locations and Summary Kernel Flaws Part 1: How Linux API Functions are Called Kernel Flaws Part 2: 32-bit System Calls Reversing Malware Part 1: The Basics Reversing Malware Part 2: First Steps Reversing Malware Part 3: Symbols and Libraries Reversing Malware Part 4: ELF Files Reversing Malware Part 5: Examining Sections and Segments Reversing Malware Part 6: Setting Up a Sand Box Reversing Malware Part 7: Setting Up a Sand Box Continued Reversing Malware Part 8: Using Strace and Ltrace Reversing Malware Part 9: Using Evan’s Debugger Reversing Malware Part 10: Using GDB Debugger Reversing Malware Part 11: Obfuscation Course Wrapup
Category: Books
Size: 2.7 GB
Added: Sept. 13, 2025, 3:30 p.m.
Peers: Seeders: 5, Leechers: 12 (Last updated: 7 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 2 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 5 7 4
udp://tracker.torrent.eu.org:451/announce 0 2 0
udp://explodie.org:6969/announce 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. 026-format.c 232 bytes
  2. 028-format2.c 783 bytes
  3. 029-format3.c 255 bytes
  4. 032-format4.c 304 bytes
  5. heap22.c 285 bytes
  6. heap24.c 779 bytes
  7. heap25.c 848 bytes
  8. rev-031-simple.asm 749 bytes
  9. rev032-simple32.asm 736 bytes
  10. lin32-rev001-courseIntroduction.mp4 61.2 MB
  11. lin32-rev002-gettingStarted.mp4 228.0 MB
  12. lin32-rev003-evansDebugger.mp4 33.3 MB
  13. lin32-rev004-gdbDebugger.mp4 21.3 MB
  14. lin32-rev005-idaPro.mp4 46.7 MB
  15. lin32-rev006-bitOfAssemblyp1.mp4 19.2 MB
  16. lin32-rev007-bitOfAssemblyp2.mp4 36.3 MB
  17. lin32-rev008-bitOfAssemblyp3.mp4 23.5 MB
  18. lin32-rev009-bitOfAssemblyp4.mp4 73.7 MB
  19. lin32-rev010-stackBufferOverflowsP1.mp4 19.4 MB
  20. lin32-rev011-stackBufferOverflowsP2.mp4 49.0 MB
  21. lin32-rev012-stackBufferOverflowsP3.mp4 18.8 MB
  22. lin32-rev013-stackBufferOverflowsP4.mp4 27.2 MB
  23. lin32-rev014-stackBufferOverflowsP5.mp4 72.1 MB
  24. lin32-rev015-stackBufferOverflowsP6.mp4 58.6 MB
  25. lin32-rev016-stackBufferOverflowsP7.mp4 82.4 MB
  26. lin32-rev017-stackBufferOverflowsP8.mp4 91.0 MB
  27. lin32-rev018-stackBufferOverflowsP9.mp4 40.8 MB
  28. lin32-rev019-stackBufferOverflowsP10.mp4 117.5 MB
  29. lin32-rev020-stackBufferOverflowsP11.mp4 34.7 MB
  30. lin32-rev021-heapBufferOverflowsP1.mp4 33.5 MB
  31. lin32-rev022-heapBufferOverflowsP2.mp4 145.9 MB
  32. lin32-rev023-heapBufferOverflowsP3.mp4 85.6 MB
  33. lin32-rev024-heapBufferOverflowsP4.mp4 114.0 MB
  34. lin32-rev025-heapBufferOverflowsP5.mp4 138.5 MB
  35. lin32-rev026-formatStringsP1.mp4 33.5 MB
  36. lin32-rev027-formatStringsP2.mp4 59.2 MB
  37. lin32-rev028-formatStringsP3.mp4 124.1 MB
  38. lin32-rev029-formatStringsP4.mp4 95.7 MB
  39. lin32-rev030-formatStringsP5.mp4 82.2 MB
  40. lin32-rev031-kernelFlawsP1.mp4 43.2 MB
  41. lin32-rev032-kernelFlawsP2.mp4 28.9 MB
  42. lin32-rev033-malwareP1.mp4 21.2 MB
  43. lin32-rev034-malwareP2.mp4 57.8 MB
  44. lin32-rev035-malwareP3.mp4 41.0 MB
  45. lin32-rev036-malwareP4.mp4 71.8 MB
  46. lin32-rev037-malwareP5.mp4 101.0 MB
  47. lin32-rev038-malwareP6.mp4 23.6 MB
  48. lin32-rev039-malwareP7.mp4 37.1 MB
  49. lin32-rev040-malwareP8.mp4 55.2 MB
  50. lin32-rev041-malwareP9.mp4 87.8 MB
  51. lin32-rev042-malwareP10.mp4 43.0 MB
  52. lin32-rev043-malwareP11.mp4 71.6 MB
  53. lin32-rev044-wrapup.mp4 54.4 MB

Discussion