Reverse Engineering

Click Here to Fill the Enquiry Form

Course No: IS0063
Any single defense may be flawed, and so a series of different defenses should be used to cover the gaps in the others’ protective capabilities. Firewalls, intrusion detection systems, malware scanners, integrity auditing procedures, and local storage encryption tools can each serve to protect information technology resources in a layered approach. This course teaches the strategies for defense in Depth.
This  course will be useful for almost computer engineers having basic knowledge of will anyway keep them aware with secure strategy irrespective of being in testing or in development. Specifically this program will be helpful to following genre of people:

  • Network/System Administrators
  • Penetration Testers
  • Exploit Researchers/Developers
  • Aspirant Engineering Bachelors
We have some pre-requisite for this course. These are not mandatory but having them will certainly be a benefit for you.

  • Basic knowledge of OSI model, Operating System
  • Basic Ethical Hacking Course
  • Network Security Course
  • Web Application Security Course
Basics

  • Fundamentals
  • Low level Software
  • Windows Fundamentals
  • Reversing Tools – Disassembler, Debugger, Decompiler
  • System Monitoring and Patching Tools

Applied Reverse Engineering

  • Deciphering File Formats
  • Auditing Program Binaries
  • Reversing Malware: Polymorphism, Metamorphism

Cracking

  • Types of protections
  • Attacking Copy Protection

Anti-Reversing

  • Types of protections
  • Eliminating Symbolic Information
  • Code Encryption
  • Anti-Debugging
  • Confusing Disassembler
  • Control Flow Transformation
  • Data Transformation

Breaking Protections

  • Patching
  • Keygenning
  • Ripping Key Generation
  • Advanced Cracking: Defender
  • Protection technology in Defender
Decompilation

  • Reversing .NET
  • Decompilation

Practice Exercises

  • Hashing functions
  • Encrypted binaries
  • Reversing UPX and other compression types
  • Stack overflows
  • Heap overflows
  • Sandbox to isolate malware
  • Unpacking malware
  • Registry changes
  • Malware communication channels
  • Digital Rights Management (DRM) implementations
  • Thwarting anti-debugger code
  • Debugging multi-threaded programs
  • Recursive traversal dissasemblers
  • Reversing .NET bytecode
  • Conditional branching statements
  • Virtual machines and bytecode
  • System vs. Code Level reversing
  • Identifying variables
  • Compilers and branch prediction
  • Memory management
  • Win32 executable formats and image sections
  • IDA Pro
  • Ollydbg for runtime analysis of malware
  • SoftICE for Kernel mode debugging with
  • Dumping executables from memory with Dumpbin
  • Reversing ntdll.dll
  • Obfuscation of file formats

DLP

$225

₹ 12,100
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Post
  • 3 Months Access
$ 225 ₹ 12,100

Online

$175

₹ 9,500
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 3 Months Access
$ 175 ₹ 9,500

Virtual Class

$300

₹ 16,200
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 30 Hours Virtual Class
$ 300 ₹ 16,200

Have a query?

You got any doubt, question, suggestion in mind? Contact us.

One of our team member will get back to you asap.

Would like to tell the world about this course? Why not share it?

 

 

 

Jay KumarReverse Engineering