25.10.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Windows Reverse Engineering (+Rust) from Scratch (Zero -> Kernel & All Things In-between)

Thomas Andersen

Learn to make the most of static reverse engineering tools (with a heavy focus on static, we avoid running targets live to make the most of our static tooling!) to understand different Windows & x86/x64 targets (malware, vulnerability research targets, obfuscated code, arbitrary software) In addition to the more expected Reverse Engineering content you also learn the underlying environment binaries operate on (x86-64, Boot process (UEFI|BIOS), PE32/32+ formats, Page Table concepts & Kernel/Hypervisor) alongside actual exercises in writing your own Kernel drivers and working with Rust to develop custom malware unpackers. We also work with real APT samples & vulnerabilities, starting from scratch to enlighten the entire process of static reverse engineering.

Skills / Knowledge

  • Malware
  • AppSec

Issued on

August 8, 2023

Expires on

Does not expire