Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=fnYp2DN_XZc



Duration: 35:51
23,229 views
673


SANS Summit & Training event schedule: http://www.sans.org/u/DuS

Stephen Sims, Fellow, Author SEC660 and SEC760, SANS Institute

Penetration testers are busy, and the idea of performing reverse engineering, debugging, and custom exploitation can seem unrealistic given typical time constraints and the skills required. As with most skills, the more experienced you become, the more likely you can tie them into a test. Much of the work can be automated given the right tools, allowing you to focus on other tasks. Join Stephen as he introduces disassembly and debugging. He covers tools such as IDA and radare2 for disassembly, common debuggers such as WinDbg, Immunity, and x64dbg, and how scripting can help speed up your work.







Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
Pen Test HackFest
SANS HackFest
Penetration Testing
malware analysis
ethical hacking
stephen sims