Shared vs Dynamic Linking in Reverse Engineering [FREE COURSE VIDEO]

In this video from our Reverse Engineering with Ghidra online course we want to show you how to deal with shared vs dynamic linking in your reverse engineering tasks. We're using Ghidra as our main tool - the course focuses on all the options it offers for reverse engineering malware. Dive in! 



Whether you dissect malware or any other software, whether your goal is security testing or understanding how everything works, reverse engineering is the most effective method you can use. This course will hone your assembly language skills, go through how arguments get passed in registers, and land on analyzing sophisticated malware. All of this will be done using Ghidra, the free and open-source tool developed by the National Security Agency. 

Ghidra is one of the most powerful Reverse Engineering tools available in the market, and the course will not only teach you regular RE techniques, but will also show how to boost them using Ghidra’s advanced capabilities. All of this will be done hands-on, with CrackMe's and challenges to test your skills. 

You will train to:

  • Level up your Assembly programming skills
  • Reveal the internals of software without access to source code
  • Approach and solve a problem with little to none prior information about it
  • Prepare for reverse engineering challenges in CTF competitions
  • Practice scripting in Ghidra
  • Extend your reverse engineering toolset with custom and modified tools. 

This video comes from module 2, which includes topics like: 

  • Reverse engineering tools (CFF explorer, sysinternals)
  • Taking a look at Shadow stack in Ghidra and debugging x64 code
  • Shared vs Dynamic Linking
  • Basic bug classes
  • Reversing C++

Who is this course for? 

  • Beginners - you want to make sure you have this important skill in your bag when they look for cyber security as a career.
  • Developers - you want to learn how to check how a program works or at what point it fails.
  • Software security teams - you want to understand how you can find bugs in your software.
  • Threat Hunters -  you have just started with analyzing malware and want to learn more.
  • Exploit researchers/developers - you who want to find bugs in execution logic or underlying functions of target applications, and create your exploits accordingly.

Check it out here >> 


Related Posts

September 16, 2020
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013