Lista de recursos para aprender ingenier铆a inversa

Empezamos la semana con un recopilatorio de enlaces para aprender/repasar ingenier铆a inversa de Jackson Thuraisamy de Security Compass. B谩sicamente es una serie de recursos que su autor fue recopilando mientras estuvo aprendiendo a encontrar vulnerabilidades de corrupci贸n de memoria en Windows. El resultado es una lista bastante actualizada y variada con v铆deos, art铆culos, tutoriales, writeups, etc., que siempre conviene tener a mano para revisar. Aqu铆 os la dejo:
  1. LiveOverflow Binary Hacking馃専馃挰
  2. OpenSecurityTraining.info: Introductory Intel x86馃専
  3. OpenSecurityTraining.info: Introduction to Reverse Engineering Software
  4. RPISEC: Modern Binary Exploitation馃専
  5. OpenSecurityTraining.info: The Life of Binaries
  6. OpenSecurityTraining.info: Reverse Engineering Malware
  7. RPISEC: Malware Analysis
  8. The C Programming Language (K&R)
  9. The GNU C Reference Manual
  10. Learn C the Hard Way
  11. Learn C in Y Minutes
  12. Practical Reverse Engineering馃専馃挰
  13. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software馃専馃挰
  14. Assembly Language Step-by-Step: Programming with Linux
  15. Wikibooks: x86 Disassembly
  16. A Bug Hunter's Diary馃専馃挰
  17. Reversing: Secrets of Reverse Engineering馃専馃挰
  18. The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  19. Windows Internals馃専
  20. Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
  21. Basic Dynamic Analysis with IDA Pro and WinDbg馃挰
  22. A Link to the Past: Abusing Symbolic Links on Windows
  23. Windows Kernel Graphics Driver Attack Surface
  24. bee13oy: Attacking Antivirus Software's Kernel Driver馃挰
  25. Direct X: Direct Way to Microsoft Windows Kernel
  26. A Window Into Ring 0
  27. Windows Drivers Attack Surface
  28. Malware Unicorn: Reverse Engineering Malware 101馃専
  29. HumbleSec: Assembly to Pseudocode Manually馃挰
  30. Mozilla: A Crash Course in Memory Management
  31. Corelan Team Exploit Writing
  32. Hacking the PS4: Userland ROP馃挰
  33. What is a "good" memory corruption vulnerability?馃専
  34. Attacking JavaScript Engines: A case study of JavaScriptCore and CVE-2016-4622
  35. The Stack Clash (Qualys Security Advisory)
  36. Windows Kernel Exploitation Part 3: Arb. Overwrite, NULL Ptr, Type Confusion And Int. Overflow Examples
  37. Windows Kernel Exploitation Part 4: Introduction to Windows Kernel Pool Exploitation
  38. hasherezade: Starting with Windows Kernel Exploitation
  39. Windows Kernel Exploitation Part 0: Kernel Debugging
  40. Windows Kernel Exploitation Part 1: Getting Started With The HackSysTeam Extremely Vulnerable Driver
  41. Windows Kernel Exploitation Part 2: My First Kernel Exploit
  42. A Brief Introduction To Using Z3 With Python
  43. FuzzySecurity Tutorials馃専馃挰
  44. phoenhex team write-ups馃専馃挰
  45. Project Zero Issue Tracker馃専馃挰
  46. Flare-On Challenge Solutions: 2015
  47. Flare-On Challenge Solutions: 2016
  48. Exploiting a Firefox UAF with Shared Array Buffers
  49. Analysis and Exploitation of an ESET Vulnerability
  50. Attacking the Windows NVIDIA Driver
  51. Smashing Flare-On #2 with Concolic Testing
  52. Windows Kernel Resources馃挰
  53. Dennis Yurichev's Reversing Challenges
  54. Exploit Exercises馃専
  55. Flare-On Challenges
  56. Compiler Explorer馃専馃挰
  57. HackSys Extreme Vulnerable Windows Driver
  58. Trail of Bits: manticore
  59. Trail of Bits: mcsema馃挰
  60. QuarksLab: Triton
  61. UCSB: Angr
  62. CMU: Pharos
  63. CEA: miasm
  64. CEA: qira

Comentarios

  1. Gracias por compartir tal informaci贸n.

    ResponderEliminar
  2. gracias por compartirlo,estaba buscando algo asi

    ResponderEliminar
  3. Bueno... Pues voy a intentar fum谩rmelo todo como si de una Carrera se tratase.
    A ver hasta d贸nde llego.

    ResponderEliminar
  4. Hola...perd贸n por revivir este art铆culo del 2017, pero creo que falta algo... Os hab茅is dejado fuera al gran Ricardo Narvaja y sus cursos, tanto de reversing,como de exploits y demas... Y la lista de crackslatinos...!!!!

    ResponderEliminar

Publicar un comentario