
Sign up to save your podcasts
Or
Binary exploitation and reverse engineering may sound intimidating—but in this Advanced Pentesting Masterclass (Part 2) by InfosecTrain, we simplify the concepts and walk through practical, real-world applications. In just 60 minutes, you’ll gain hands-on skills to identify, exploit, and mitigate binary-level vulnerabilities.📘 What You’ll Learn:
➡️Fundamentals of binary exploitation & memory corruption
➡️Common attack vectors: buffer overflows & format string attacks
➡️Analyzing executables and disassembly basics
➡️Reverse engineering with tools like Ghidra
➡️Writing and executing simple shellcode payloads
➡️Real-world exploitation demos and mitigation strategies
🎧Ideal for penetration testers, reverse engineers, and advanced cybersecurity learners—this masterclass brings binary exploitation to life with practical clarity.
5
22 ratings
Binary exploitation and reverse engineering may sound intimidating—but in this Advanced Pentesting Masterclass (Part 2) by InfosecTrain, we simplify the concepts and walk through practical, real-world applications. In just 60 minutes, you’ll gain hands-on skills to identify, exploit, and mitigate binary-level vulnerabilities.📘 What You’ll Learn:
➡️Fundamentals of binary exploitation & memory corruption
➡️Common attack vectors: buffer overflows & format string attacks
➡️Analyzing executables and disassembly basics
➡️Reverse engineering with tools like Ghidra
➡️Writing and executing simple shellcode payloads
➡️Real-world exploitation demos and mitigation strategies
🎧Ideal for penetration testers, reverse engineers, and advanced cybersecurity learners—this masterclass brings binary exploitation to life with practical clarity.
370 Listeners
1,016 Listeners
322 Listeners
140 Listeners
8,001 Listeners
175 Listeners
188 Listeners
203 Listeners
73 Listeners
134 Listeners
169 Listeners
33 Listeners
19 Listeners
0 Listeners
4 Listeners