• Post category:StudyBullet-20
  • Reading time:5 mins read


Master Reverse Engineering, Malware Analysis, Linux, Cyber Security, Ghidra,x86-64, IDA Pro, IDA Free, Assembly and NASM

What you will learn

The theory behind disassembly and its role in reverse engineering.

The four stages of binary analysis: Preprocessing, Compilation, Assembly, and Linking.

The compilation process breakdown and the purpose of each phase.

Working with symbolic information in stripped and not stripped binaries.

How binary executables load and execute.

Installation and basics of Ghidra, a tool for reverse engineering.

Installing the Java Development Kit (JDK) for Ghidra.

Navigating and utilizing Ghidra for project analysis.

Real-world malware analysis using Ghidra.

Practical reverse engineering skills through hands-on malware analysis.

Writing a 64-bit assembly program to display “Hello, world!” using a makefile.

Installing and setting up the SASM assembler for assembly programming.

Understanding the superiority of NASM (Netwide Assembler) and comparing it with other assemblers.

Creating a basic “Hello, world!” program in assembly without using a makefile.

Exploring the theory of disassembly and disassemblers in reverse engineering.

Analyzing the fundamentals of disassembly and its importance in reverse engineering.

Delving into various data types and their representation in assembly language.

Understanding CPU architectures, binary files, and their relationship.

Converting decimal numbers to binary using basic mathematical operations in assembly.

Initiating debugging with gdb (GNU Debugger) and configuring debugging flavors.

Debugging techniques for locating and inspecting variables in memory addresses.

Expanding knowledge of gdb functionalities for advanced debugging scenarios.

Writing a second 64-bit assembly program, creating the source code, and generating a makefile.

Analyzing program output using gdb and building a makefile for the assembly code.

Exploring binary analysis and comprehending the four stages of compilation.

Learning about preprocessing, compilation, assembly, and linking phases of program compilation.

Distinguishing between symbols, stripped, and non-stripped binaries.

Utilizing READELF to view symbolic information in binaries and object files.

Revealing the contents of an object file and attempting to analyze binary executables.

Understanding how binary files load and execute in theory.

Exploring the Executable and Linkable Format (ELF) used in Linux executables, focusing on the executable header.

Learning about ELF fields and ELF program header fields.

Understanding the fundamentals of Windows PE (Portable Executable) format used in Windows executables.

Mastering bitwise logical operations: OR, XOR, NOT, and AND.

Applying OR logic to manipulate data and perform bitwise operations.

Implementing NOT logic to invert bits in assembly programming.

Exploring XOR logic and its applications in data manipulation.

Understanding AND logic and how it’s used for masking and bit filtering.

Utilizing the Data Display Debugger (DDD) to analyze assembly programs.

Developing assembly programs to analyze using DDD and understanding the debugging process.

Analyzing RAX register values using DDD and gdb.

Mastering control flow with jump and loop instructions in assembly.

Learning about common errors in assembly programming and their solutions.

Using conditional statements and jumps to control program flow.

Implementing jump instructions based on equality conditions.

Understanding jump instructions for inequality conditions.

Employing jump instructions for comparisons involving greater values.

Implementing jump instructions for greater-than-or-equal-to conditions.

Using jump instructions for comparisons involving lesser values.

Implementing jump instructions for less-than-or-equal-to conditions.

Developing an assembly project that utilizes jump and loop instructions effectively.

Creating a calculator project using assembly language to perform arithmetic operations.

Defining variables and memory allocation in assembly programming.

Implementing addition and subtraction operations in assembly language.

Adding final touches and decorations to assembly projects.

Explaining the practical usage of registers in assembly programming.

Completing the assembly projects with a focus on optimization and efficiency.

Utilizing memory manipulation techniques to interact with data structures.

Exploring a more advanced project called “EXABYTE” involving memory manipulation.

Testing and analyzing projects using tools like Readelf and GDB for verification and debugging.

Add-On Information:


Get Instant Notification of New Courses on our Telegram channel.

Note➛ Make sure your 𝐔𝐝𝐞𝐦𝐲 cart has only this course you're going to enroll it now, Remove all other courses from the 𝐔𝐝𝐞𝐦𝐲 cart before Enrolling!


  • Unlock the secrets of software with hands-on expertise in reverse engineering, dissecting binaries to understand their inner workings.
  • Demystify the execution of software by delving into the intricacies of the x86_64 architecture and the Linux operating system.
  • Gain proficiency in industry-standard tools like Ghidra and IDA Pro/Free, transforming complex code into understandable logic.
  • Become adept at malware analysis, identifying threats and understanding their propagation mechanisms.
  • Master the art of disassembly, translating machine code into human-readable assembly language.
  • Develop a deep understanding of how software is built, from compilation to the final executable.
  • Learn to analyze both stripped and non-stripped binaries, revealing hidden functionalities.
  • Explore the foundational concepts of binary executable loading and execution.
  • Write and understand x86_64 assembly code, including the creation and management of makefiles.
  • Become proficient in using the GNU Debugger (gdb) for in-depth program analysis and bug hunting.
  • Understand and manipulate bitwise operations for advanced data processing and security applications.
  • Analyze and debug complex programs using specialized tools like the Data Display Debugger (DDD).
  • Gain practical experience with the ELF and PE file formats, crucial for understanding Linux and Windows executables.
  • Develop skills in implementing control flow logic within assembly programs using jump and loop instructions.
  • Build functional assembly programs, including practical projects like a calculator.
  • Learn essential techniques for memory manipulation and interaction with data structures.
  • PROS:
  • Offers a comprehensive, hands-on approach to mastering essential reverse engineering and assembly skills.
  • Covers a robust set of powerful tools widely used in the cybersecurity industry.
  • Provides a strong foundation for careers in malware analysis, vulnerability research, and software security.
  • CONS:
  • The intense nature of a bootcamp format may require significant prior foundational knowledge or dedicated self-study outside of scheduled hours.
English
language
Found It Free? Share It Fast!