Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017
Channel:
Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=fnYp2DN_XZc
SANS Summit & Training event schedule: http://www.sans.org/u/DuS
Stephen Sims, Fellow, Author SEC660 and SEC760, SANS Institute
Penetration testers are busy, and the idea of performing reverse engineering, debugging, and custom exploitation can seem unrealistic given typical time constraints and the skills required. As with most skills, the more experienced you become, the more likely you can tie them into a test. Much of the work can be automated given the right tools, allowing you to focus on other tasks. Join Stephen as he introduces disassembly and debugging. He covers tools such as IDA and radare2 for disassembly, common debuggers such as WinDbg, Immunity, and x64dbg, and how scripting can help speed up your work.
Other Videos By SANS Institute
Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training
Pen Test HackFest
SANS HackFest
Penetration Testing
malware analysis
ethical hacking
stephen sims