I’m pleased to announce the release of the Reverse Engineering open course. It has taken more than one year but it’s finally here!
This course is a journey into reversing executable binaries from 3 different angles: 1) Malware analysis, 2) Bug hunting and 3) Exploit writing. Windows and Linux operating systems, on both x86 and x86_64 architectures, are under the scope. It’s not a purely tools-oriented approach but a mix with fundamental concepts, aiming to explain how things work underneath.
All of the content is licensed under Creative Commons Attribution-ShareAlike 4.0 International, and contributions very much welcomed. Published material includes slides and labs for 11 classes (with demos and hands-on exercises). Slides are both in English and Spanish. The course Linux VM has not been published due to its size. I can help you to replicate the environment if needed.
Thanks to Core Security because much of this work reflects my experience as part of the Core Impact team.
If you are interested in having this course/training on-site, send me an email.
Course website: https://martin.uy/reverse