All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
  • How to use Radare 2 to reverse engineer binaries.
  • Disassembling binaries.
  • Navigating in the binary.
  • Debugging executables.
  • Patching executables.

In this course we will learn about the Radare 2 reverse engineering framework. It is an open source free alternative to IDA Pro. I started to work with it because I think nobody will buy IDA Pro unless it is paid by your employer. Radare 2 is a perfect free alternative, its only disadvantage is that it could be hard to start using it. This is where this course comes in. My goal was to get you over the hard part as fast as possible. So that you can get comfortable with Radare 2.

These are the things you will learn in this course:

  • Setting up Radare

  • Understanding its syntax

  • Understanding its config

  • Information gathering about the binary

  • Navigation in the binary

  • Cross references

  • Run-time debugging

  • Patching the binary

However there are a few things that are not goals of this course:

  • We are going to focus on the tool and not on assembly, so this is not an assembly course. You can follow along without understanding everything in assembly and that is fine, but don’t expect that you can learn assembly in a few hours.

  • We will learn some reverse engineering techniques but it is not our goal to learn everything.

However what you are definitely will learn is how to use Radare 2, and after this course if you need to analyse a binary you will be able to pull out radare from your sleeves anytime you need it.

All exercises are hands-on, so you are expected to repeat the exercises yourself. I have done quite a lot of trainings myself, live or online, and I can tell you that without practicing they won't stick. This is a really practical training so I encourage you to try everything yourself, because just watching the videos will only give you the illusion that you learnt something, 80% of the learning happens when you do the exercises.

  • Basic understanding of assembly.
  • Basic understanding of the linux terminal
  • People who already know basic reverse engineering and want to learn how Radare2.
  • Hackers looking for a free tool instead of IDA Pro.
View More...
  • Section 1 : Preparation 6 Lectures 00:15:07

    • Lecture 1 :
    • In this lecture I introduce the course, who should take it and how.
    • Lecture 2 :
    • Disclaimer
    • All ethical hacking courses should have a disclaimer, this is it for this course.
    • Lecture 3 :
    • What is Radare 2?
    • Quick introduction to the tool that we are going to discover in this course.
    • Lecture 4 :
    • Downloads
    • Hi, To follow along with the course and do the exercises please download the following virtual machine either for VirtualBox, which I will use in the rest of the course, or in OVA/OVF format that you can import as an appliance in VMWare as well : Virtualbox VM: OVA format: To log in use username: aether password: 4ether The next lecture will show how to use this VM. See you there. Geri
    • Lecture 5 :
    • Target Application
    • This lecture quickly introduces the target software that we are going to reverse engineer with Radare2.
    • Lecture 6 :
    • Environment Setup
    • This lecture shows how to use the provided virtual machine and how to install Radare2 on other computers.
  • Section 2 : Reversing with Radare2 9 Lectures 01:51:36

    • Lecture 1 :
    • Radare2 Syntax
    • First encounter with Radare2's not-so-obvious-but-cool syntax.
    • Lecture 2 :
    • Configuration
    • Quick introduction to Radare2's configuration file.
    • Lecture 3 :
    • Binary Infos
    • Learn to extract the general information about the binary with R2.
    • Lecture 4 :
    • Navigating in the Binary
    • You are going to learn how to move around in the binary as your are trying to reverse different parts of it.
    • Lecture 5 :
    • Cross References
    • You will learn how to use cross references in Radare2, to find where elements are being used in the assembly code.
    • Lecture 6 :
    • Runtime Debugging
    • Radare2 is also great for dynamic debugging. This is what you will learn in this lecture.
    • Lecture 7 :
    • Patching
    • Patching the tested binary on disk or in memory could allow you to execute parts of the code you would not reach otherwise. We will go through how this can be done with Radare2.
    • Lecture 8 :
    • Cutter: the R2 GUI
    • Cutter is the best graphical user interface that Radare2 had so far. We will try cutter through solving a challenge from the Fireeye FLARE-ON challenges.
    • Lecture 9 :
    • Finishing the Challenge
    • In this lecture I will show you how to finish the FLARE-ON challenge.
  • Section 3 : What is next? 1 Lectures 00:03:11

    • Lecture 1 :
    • Next Steps
    • You arrived to the end of this course, however there is still plenty to learn about reverse engineering. I will give you some tips on how you can proceed and then we say good bye.
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Geri Revay,

My name is Gergely (Geri) Revay and I’ve been working in IT security for quite a few years now. Currently I’m a penetration tester for a German consulting company. I started studying IT in elementary school. Later I went to a technical high school where I specialized in IT. Hence my very first programming and administration knowledge come from that time. Another important thing in my teenage years was that I attended the local student drama club. It was a lot of fun and also very useful if one has to present in front of an audience like I do. When I was 18 I started my university studies at the Budapest University of Technology and Economics which is a great University and I’m sure that it played an important part in what I have become and where I’m right now. In third year I was really eager to see a bit more from the awesome world so I went to Oslo, Norway and I spent an extremely interesting and unforgettable semester there as an exchange student at Høgskolen i Oslo which is now called Høgskolen i Oslo og Akershus. The most important lesson I learnt was that I love to be in an international environment and that eventually I’m a good communicator which I hadn’t thought before. After returning to Hungary I started to work as a development trainee at Telenor Hungary. When my boss told me that I should install Linux at home as well because I was going to need it, I took his advice and hence the fun began. The company was an interesting place too, I got insight into the service provider world, learnt how MMS works and started to use php, perl, shell script etc. I was looking for opportunities to go abroad again, and I did. That time I went to Glasgow, UK where I worked for BT as a call centre advisor in sales. Although not working in my own professional field, it was an important experience of my life. First of all since then I cannot be mad at any call centre advisor however stupid and slow they are because probably it’s just not their fault. Secondly I learned how to handle difficult people on the phone . Also one sales training in a lifetime is good for everybody, just to know how the world goes. Last but not least I got to know some of the weirdest English accents. When I returned to Hungary after 5 months I specialized in information and network security at the university and started working for Balabit IT Security as a quality assurance engineer. I had a chance to see this development company to grow from 40 people to 150. As the company grew my job changed quite a bit. At the beginning I worked on all products from syslog-ng to Zorp firewall with their customized Linux OS called ZorpOS. I was a Test team leader for a while before the company introduced the SCRUM development methodology which is a great stuff in my opinion. I saw how individual developers and testers slowly developed to become an efficient team and worked side-by-side without any typical QA vs. developer problems, how they learned to focus on the common target of building a quality product. At the end I worked with my team on the linux based appliance called syslog-ng Store Box. It was really interesting to work with such a complex system that included linux, SAN, hardware, php, python, C, javascript, syslog, aufs etc. Currently I work as a penetration tester digging into security as deep as I can. I also do some research when I have time.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction


    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.