Shared vs Dynamic Linking in Reverse Engineering [FREE COURSE VIDEO]

(118 views)

In this video from our Reverse Engineering with Ghidra online course we want to show you how to deal with shared vs dynamic linking in your reverse engineering tasks. We're using Ghidra as our main tool - the course focuses on all the options it offers for reverse engineering malware. Dive in! 



Whether you dissect malware or any other software, whether your goal is security testing or understanding how everything works, reverse engineering is the most effective method you can use. This course will hone your assembly language skills, go through how arguments get passed in registers, and land on analyzing sophisticated malware. All of this will be done using Ghidra, the free and open-source tool developed by the National Security Agency. 

Ghidra is one of the most powerful Reverse Engineering tools available in the market, and the course will not only teach you regular RE techniques, but will also show how to boost them using Ghidra’s advanced capabilities. All of this will be done hands-on, with CrackMe's and challenges to test your skills. 

You will train to:

  • Level up your Assembly programming skills
  • Reveal the internals of software without access to source code
  • Approach and solve a problem with little to none prior information about it
  • Prepare for reverse engineering challenges in CTF competitions
  • Practice scripting in Ghidra
  • Extend your reverse engineering toolset with custom and modified tools. 

This video comes from module 2, which includes topics like: 

  • Reverse engineering tools (CFF explorer, sysinternals)
  • Taking a look at Shadow stack in Ghidra and debugging x64 code
  • Shared vs Dynamic Linking
  • Basic bug classes
  • Reversing C++

Who is this course for? 

  • Beginners - you want to make sure you have this important skill in your bag when they look for cyber security as a career.
  • Developers - you want to learn how to check how a program works or at what point it fails.
  • Software security teams - you want to understand how you can find bugs in your software.
  • Threat Hunters -  you have just started with analyzing malware and want to learn more.
  • Exploit researchers/developers - you who want to find bugs in execution logic or underlying functions of target applications, and create your exploits accordingly.

Check it out here >> 


[custom-related-posts title="Related Posts" none_text="None found" order_by="title" order="ASC"]

April 26, 2022
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.