Reverse Engineering Theory

Reverse Engineering Theory

Train your skills in cyber security Reverse Engineering Theory Welcome to this Course on Reverse Engineering. It is the first of two courses on Reverse Engineering: This course focuses on the theoretical foundations, but include also a practical challenge for trying...
Reverse Engineering Practice

Reverse Engineering Practice

Train your skills in cyber security Reverse Engineering Practice Welcome to this Course on Reverse Engineering. It is the second of two course on Reverse Engineering: While the first course focused on the theoretical foundations and the Radare2 framework, this course...
Code Analysis

Code Analysis

Train your skills in cyber security Code Analysis The course consists of two parts: First a set of readings about static taint analysis. Since it contains a fair bit of Mathematics, the readings are included as a PDF document. After reading the document, we invite you...
APR Spoofing

APR Spoofing

Train your skills in cyber security APR Spoofing In this short course you will learn about ARP, and how it is vulnerable to spoofing attacks. ARP stands for Address Resolution Protocol, and is used for resolving addresses between layer 2 and layer 3 in the OSI model...
Metasploit and MSFVenom

Metasploit and MSFVenom

Train your skills in cyber security Metasploit and MSFvenom The Metasploit framework can be used to access systems that are vulnerable to known exploits. This enables a hacker to get access to insecure systems. Hackers can gain access utilizing the...