View Code? Open in Web Editor
NEW
This project forked from naihsin/nthu2021
nthu2021's Introduction
10月 1日 (星期五) · 下午1:20 - 4:20
- [Course outline]
- [Attack& defense:An overview]
- [Linux programming]
- [Linux binary analysis]
week 3: Basic Reverse Engineering
- [assmebly Programming]
- NASM Assembly programming
- GAS Assembly programming
- core Assembly language syntax
- Calling Conventions
- [Basic Reverse Engineering]
- gdb
- objdump
- radare2
- Ghidra
- [RE實戰]助教示範
week 4 : REverse engineering:Symbolic execution
- Symbolic execution
- z3
- angr
- case study
week 5: buffer overflow ROP1
week 6: ROP2 format string vuln
week 7: heap exploitation
week 8: windows internals 1
- Tools:
- Windows Sysinternals(since 1996)
- Live KD
- windbg and Kernel debugging
- powershell
- python
week 10: windows internals 2
From penetration test to Vulnerability Finding
week 13:Vulnerability Finding:bug bounty| FUZZ
From Forensics to Malware analysis
week 15: Malware Analysis
week 16: Defensive security: from log analysis to SOC
- Defensive security
- log analysis
- Threat hunting
- SOC
week 17: AI-powered attack and defense: An overview
nthu2021's People
Contributors