Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
SANS Summit & Training event schedule: http://www.sans.org/u/DuS
Stephen Sims, Fellow, Author SEC660 and SEC760, SANS Institute
Penetration testers are busy, and the idea of performing reverse engineering, debugging, and custom exploitation can seem unrealistic given typical time constraints and the skills required. As with most skills, the more experienced you become, the more likely you can tie them into a test. Much of the work can be automated given the right tools, allowing you to focus on other tasks. Join Stephen as he introduces disassembly and debugging. He covers tools such as IDA and radare2 for disassembly, common debuggers such as WinDbg, Immunity, and x64dbg, and how scripting can help speed up your work.
Видео Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 канала SANS Institute
Stephen Sims, Fellow, Author SEC660 and SEC760, SANS Institute
Penetration testers are busy, and the idea of performing reverse engineering, debugging, and custom exploitation can seem unrealistic given typical time constraints and the skills required. As with most skills, the more experienced you become, the more likely you can tie them into a test. Much of the work can be automated given the right tools, allowing you to focus on other tasks. Join Stephen as he introduces disassembly and debugging. He covers tools such as IDA and radare2 for disassembly, common debuggers such as WinDbg, Immunity, and x64dbg, and how scripting can help speed up your work.
Видео Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017](https://i.ytimg.com/vi/qg-zK2zv4ng/default.jpg)
![Best Entry Level Cyber Security Certifications](https://i.ytimg.com/vi/O2VstOGBHbU/default.jpg)
![Rapid Radio Reversing](https://i.ytimg.com/vi/8kIxlMIGctc/default.jpg)
![Introduction to Reverse Engineering | Ollydbg Tutorial](https://i.ytimg.com/vi/D6mVIos-S2M/default.jpg)
![BSIDES CPT 2019 - Hacking satellites with Software Defined Radio (SDR) - Gerard de Jong](https://i.ytimg.com/vi/gMwciWchH3Q/default.jpg)
![SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture](https://i.ytimg.com/vi/Q6yFqLmlcGo/default.jpg)
![Radio Hacking: Reverse Engineering Protocols Part 2 - Hak5 1914](https://i.ytimg.com/vi/vf38-8LbDuw/default.jpg)
![Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019](https://i.ytimg.com/vi/dWb3I3Zs_Cg/default.jpg)
![SEC588 Cloud Penetration Testing: What is Cloud Pen Testing and why is it different?](https://i.ytimg.com/vi/lOhvIooWzOg/default.jpg)
![HackadayU: Reverse Engineering with Ghidra Class 1](https://i.ytimg.com/vi/d4Pgi5XML8E/default.jpg)
![The Difference Between Cyber Security and Cyber Defense](https://i.ytimg.com/vi/LT2OgzjBiCk/default.jpg)
![Introduction to Malware Analysis](https://i.ytimg.com/vi/f-fMdnUW4X4/default.jpg)
![Penetration Testing vs. Bug Bounty Hunting - feat @The Cyber Mentor](https://i.ytimg.com/vi/CapJ5lQRFzk/default.jpg)
![An Introduction to Cybersecurity Careers](https://i.ytimg.com/vi/-AkuKKJ8dN0/default.jpg)
![You’re Probably Not Red Teaming (And Usually I’m Not, Either) – SANS ICS Summit 2018](https://i.ytimg.com/vi/S75Fti-7Y9Q/default.jpg)
![Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader](https://i.ytimg.com/vi/q4CxE5P6RUE/default.jpg)
![MMORPG Bot Reverse Engineering and Tracking](https://i.ytimg.com/vi/irhcfHBkfe0/default.jpg)
![Tricking modern endpoint security products | SANS@MIC Talk](https://i.ytimg.com/vi/xmNpS9mbwEc/default.jpg)
![Track 304 Advanced Social Engineering and OSINT for Penetration Testing Joe Gray](https://i.ytimg.com/vi/V6vqbDQOncY/default.jpg)