7 Days Reverse Engineering Course

Code reverse engineering (CRE) is the process of analyzing the machine code of a program, which aims to understand the principle of operation, restore an algorithm, discover undocumented program capabilities, etc. The main methods of reverse engineering are static or dynamic code analysis. In static analysis, the researcher disassembles the program code using special software, and then analyzes the assembler code. In dynamic analysis, the researcher runs the code in an isolated environment (sandbox) or debugger and analyzes the code in dynamics. Is it possible to become a good “Certified Reverse Engineer Expert” by attending training courses from us? Let’s figure it out together.

Register Now

Annex Digi Info – Reverse Engineering

You will learn in practice the most important techniques of reverse engineering: static and dynamic analysis . Get acquainted with low-level and system programming, examine in detail aspects of the internal structure of Windows. You have to study and classify malware using examples of real malwere caught on the net .

About The Course

This course includes topics that are necessary for productive reverse engineering: assembler, PE format protected mode, etc. Which focuses more on malware analysis.

Course Modules

  • Processor registers, working with memory
  • Representation of data, code, command opcodes. The main commands of YA
  • Arithmetic, logical commands
  • Chained operations
  • Subroutines
  • BIOS interrupts
  • Writing a custom MBR
  • Processor registers. Working with memory
  • Arithmetic, logical commands. Conditional / Unconditional Jump Commands
  • Command opcodes
  • Writing an assembly program using WinApi functions
  • Writing a C / C ++ program and examining its properties in compiled form
  • We write a program in C # and analyze it in assembled form
  • Setting up a working environment for debugging kernel-mode drivers
  • Kernel objects
  • Memory manager
  • I / O manager. Working with memory
  • PE format
  • Import table
  • Export table / relocation table
  • Windows traps
  • Interception of WinApi functions
  • Native Application Programming
  • Ways to add to startup
  • Service programming
  • Dynamic code analysis
  • Static code analysis
  • Shell code development
  • Metasploit
  • The introduction of the reverse went into some firmware of routers
  • Buffer Overflow vulnerability. Part 1
  • Buffer Overflow vulnerability. Part 2
  • UAF vulnerability

All About the Courses

Certified Reverse Engineering Expert : $ 15.00 | ₹ 999

  • Weekdays Classes
  • 7 Days
  • Training Mode: Online
  • Practice on Real Time Projects
  • Lifetime Membership