Alex Penrose
Alex has over a decade of Cyber security experience and has worked for large multi-national companies, government and contract work.

When time allows, he enjoys teaching on various Cyber security topics in public and private sector. A perpetual student himself, he loves technical research in the Cyber industry, gathering and sharing knowledge.

TUTORIAL: x86 Assembly Fundamentals with JollyFrogs
Technical Level (3 being the highest score): 1

Whether you enjoy participating in capture the flag events, penetration testing, reversing, unpacking or any other cyber security related activity, at some point you will likely face CPU code. This course teaches the fundamentals of native byte-code language of your CPU.

Whether you want to put together a fully undetected shell-code for your newly found zero-day during a penetration test, or want to remove the many layers of protection from protected malware, if you haven't been taught the fundamentals of Assembly, you could get stuck without really knowing why you are stuck.

You might become dependent on other people's work or end up downloading risky shell-codes or tools from dodgy websites without knowing what they do. This course will teach you to read and understand \x31\xc9\xf7\xe1\xb0\x0b\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\xcd\x80, and will open the door for you to start writing your own custom shell code.

You will learn about common Assembly instructions like MOV, PUSH, POP, XOR, the stack, how to code a simple program in assembly language, how to analyse Linux shell code, and there will be a small challenge at the end of the training with (small) prizes!