Torrent details for "Udemy - Reverse Engineering: Ghidra For Beginners"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
2.17 GB
Info Hash:
9d12322a75ed486c1ec6c7484346001c9a431fd1
Added By:
Added:  
03-05-2021 17:48
Views:
736
Health:
Seeds:
6
Leechers:
2
Completed:
82
wide




Description
wide
Image error
Description

If you have never used Ghidra before and want to learn how get started with using Ghidra to reverse engineer and analyse programs, then this is the course for you.

Ghidra is the strong competitor to IDA Pro and is used by NSA itself for Reverse Engineering. And the best thing is that it is totally free. It is used for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn Ghidra by solving  Linux  and Windows CrackMe challenges.  A CrackMe is a small program designed to test a programmer’s reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally and also for reverse engineers who want to understand how Linux  and Windows binaries work. This course will equip you with the knowledge and skill to use Ghidra in addition to whatever other tools you might already be familiar. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.

I will start off with showing you how to install Oracle Virtual Box. Then, installing Java SDK and Kali Linux in the Virtual Box. Then, we will reverse engineer Linux executable files.

Next, we will move on to installing Java SDK and Ghidra for Windows and reverse and analyze Windows programs. You will also learn how to reverse GUI CrackMe’s. You will learn how to use Function Graphs, Function Call Trees, Search String, Defined Strings and more. The course will also cover how to identify program entry point and also find the main functions for command line interface apps and WinMain for GUI based apps.

By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries.

What you will learn:

   How to disassemble programs into assembly code
   How to decompile programs to C code
   Static Analysis
   Understand Windows API’s
   Identify entry points, main and WinMain functions
   Use String Search and Defined Strings
   Visualizing the Call Stack using Function Graph and Function Call Trees
   Solving Crackmes
   and more …

Suitable for:

Anyone interested to learn Reverse Engineering on Linux and Windows executable files.
Who this course is for:

   Anyone interested to learn how to get started with Ghidra on Linux and Windows
   Those who have never used Ghidra before and want to learn the basics
   Students with some basic experience with other disassemblers

Requirements

   Familiar with basic Linux Commands
   Some Basics of Assembly and C would be helpful but not strictly necessary
   Windows PC

Last Updated 3/2021

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes