Загрузка страницы

Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017

SANS Summit & Training event schedule: http://www.sans.org/u/DuS

Stephen Sims, Fellow, Author SEC660 and SEC760, SANS Institute

Penetration testers are busy, and the idea of performing reverse engineering, debugging, and custom exploitation can seem unrealistic given typical time constraints and the skills required. As with most skills, the more experienced you become, the more likely you can tie them into a test. Much of the work can be automated given the right tools, allowing you to focus on other tasks. Join Stephen as he introduces disassembly and debugging. He covers tools such as IDA and radare2 for disassembly, common debuggers such as WinDbg, Immunity, and x64dbg, and how scripting can help speed up your work.

Видео Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 канала SANS Institute
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
8 мая 2018 г. 0:47:30
00:35:51
Яндекс.Метрика