Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Auditing Binaries for Security Vulnerabilities
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Auditing Closed-Source Software
- 3 Legal considerations (EU)
- 4 Why audit binaries?
- 5 Approach A: Stress Testing
- 6 Approach B: Manual Audit
- 7 Approach C. Looking for suspicious constructs
- 8 Skills the auditor needs
- 9 Tools the auditor needs
- 10 C/C++ code auditing recap
- 11 Finding it in the disassembly
- 12 An Example: iWS 4.1 SHTML
- 13 Advanced topics: Automation