Kernel Flaws Part 2: 32-bit System Calls
Videos from Reverse Engineering Linux 32-bit Applications
-
Kernel Flaws Part 1: How Linux API Functions are Called -
You are watching this now -
Reversing Malware Part 1: The Basics -
Reversing Malware Part 2: First Steps