
Sign up to save your podcasts
Or


Binary exploitation and reverse engineering may sound intimidating—but in this Advanced Pentesting Masterclass (Part 2) by InfosecTrain, we simplify the concepts and walk through practical, real-world applications. In just 60 minutes, you’ll gain hands-on skills to identify, exploit, and mitigate binary-level vulnerabilities.📘 What You’ll Learn:
➡️Fundamentals of binary exploitation & memory corruption
➡️Common attack vectors: buffer overflows & format string attacks
➡️Analyzing executables and disassembly basics
➡️Reverse engineering with tools like Ghidra
➡️Writing and executing simple shellcode payloads
➡️Real-world exploitation demos and mitigation strategies
🎧Ideal for penetration testers, reverse engineers, and advanced cybersecurity learners—this masterclass brings binary exploitation to life with practical clarity.
By InfosecTrain3.7
33 ratings
Binary exploitation and reverse engineering may sound intimidating—but in this Advanced Pentesting Masterclass (Part 2) by InfosecTrain, we simplify the concepts and walk through practical, real-world applications. In just 60 minutes, you’ll gain hands-on skills to identify, exploit, and mitigate binary-level vulnerabilities.📘 What You’ll Learn:
➡️Fundamentals of binary exploitation & memory corruption
➡️Common attack vectors: buffer overflows & format string attacks
➡️Analyzing executables and disassembly basics
➡️Reverse engineering with tools like Ghidra
➡️Writing and executing simple shellcode payloads
➡️Real-world exploitation demos and mitigation strategies
🎧Ideal for penetration testers, reverse engineers, and advanced cybersecurity learners—this masterclass brings binary exploitation to life with practical clarity.

651 Listeners

1,029 Listeners

178 Listeners

3 Listeners