Companies Home Search Profile

Exploit Development Tutorial for Hackers and Pentesters

Focused View

Swapnil Singh

14:47:43

340 View
  • 1. Thanks for joining.mp4
    00:53
  • 2. What skills are needed for this course .mp4
    00:50
  • 3. Lab machine configurations.mp4
    01:10
  • 1. Before any Exploitations.mp4
    01:15
  • 2. Installing gdb plugins for exploit development lab.mp4
    08:33
  • 3. GDB basics for exploit development.mp4
    22:58
  • 4. Binary compilation process.mp4
    12:36
  • 5. Static memory layout of Binary file.mp4
    18:06
  • 6. Dynamic Memory layout inside the process.mp4
    05:35
  • 7. what is the purpose of stack in memory .mp4
    03:15
  • 8. Memory segmentation of binary and stack.mp4
    09:32
  • 9. Concept of stack inside the binary.mp4
    05:55
  • 10. Full examination of stack area in binary.mp4
    19:39
  • 11. Full analysis of stacks in multi level functions of binary.mp4
    21:47
  • 12. Basic ELF static analysis.mp4
    16:02
  • 13. Practical concepts of a linker.mp4
    17:58
  • 14. What does a loader acutally do .mp4
    03:25
  • 15. What are the symbols inside the binary .mp4
    14:17
  • 16. Purpose of plt and got sections in binary.mp4
    12:19
  • 17. Practical identification of plt and got sections inside gdb.mp4
    09:57
  • 18. Dangers of SUID files.mp4
    38:28
  • 1. Mystery of return address in main function.mp4
    12:05
  • 2. What exactly is a Buffer Overflow Attack .mp4
    13:44
  • 3. What is ASLR and why it is used inside Operating System .mp4
    10:38
  • 4. How to track down all the local variables inside running memory of binary.mp4
    36:20
  • 5. Tracking down the function input arguments inside stack boundary.mp4
    14:33
  • 6. Tracking down return address of any function inside stack memory.mp4
    22:21
  • 7. Exploiting our first binary program in stack memory area.mp4
    32:59
  • 8. Basic important roadmap of exploit development process.mp4
    25:06
  • 9. Developing first exploit to get a system shell.mp4
    50:47
  • 10. Environment variables and the stack.mp4
    25:08
  • 11. Why do we use environment variable .mp4
    10:23
  • 12. Developing Stack Buffer overflow exploit by using environment variable.mp4
    27:13
  • 13. Exploiting a program with very less buffer area.mp4
    22:35
  • 14. How to reduce address searching steps inside stack.mp4
    13:44
  • 15. Exploiting the binary without using nops.mp4
    12:14
  • 16. Finding the shell address in more reliable way.mp4
    09:20
  • 1. What is DEP protection inside the binary .mp4
    05:50
  • 2. Concept of bypassing DEP protection of the binary.mp4
    08:32
  • 3. Bypassing DEP protection of Binary.mp4
    36:45
  • 4. Bypassing ASLR protection of the Binary.mp4
    26:26
  • 5. Understanding Stack Cookie protection mechanism.mp4
    11:58
  • 6. Tracking down the canary value inside the protected binary.mp4
    20:19
  • 7. Understanding the stack Cookie protection behaviour of binary inside gdb.mp4
    14:46
  • 8. Bypassing stack cookie protection of the Binary.mp4
    42:38
  • 9. What is RELRO exploit.mp4
    07:33
  • 10. Bypassing RELRO protection of Binary.mp4
    56:24
  • 1. What is Return Oriented Programming and how ROP exploits works.mp4
    19:04
  • 2. Developing ROP exploit by using multiple ropgadgets to get the shell.mp4
    36:14
  • 3. ROP chaining the libc functions to get the specific user shell by pop3ret.mp4
    17:34
  • Description


    Learn indepth exploit development techniques in linux and windows binary files and become a zero-day exploit developer

    What You'll Learn?


    • You will learn Exploit Development basic building blocks for Linux and Windows so that you can understand most of the topics very easily in exploit development
    • This course will start your journey from very basics and go to indepths of Exploit Development processes in Linux and Windows platform exploit developments.
    • Exploit Development skills in Linux and Windows plays a very important role in Hacking Career, If you know Exploit Development skills then its a plus point.
    • Concept of exploiting software systems are very crucial to understand and this course will teach you all the important concepts of exploit development processes

    Who is this for?


  • Ethical Hackers who want to learn the most important skills in hacking which is Exploit Development skills
  • Penetration testers who want to learn Exploit Development skills in Linux and Windows OS
  • Malware Analysts who wants to improve their skills in Exploit Development process in Linux and Windows OS
  • Programmers who want to know how software protections can be bypassed with Exploit Development process in Linux and Windows.
  • Developers who want to improve their secure programming skills by knowing exploit development process in Linux and Windows
  • Computer Science students who wanted to explore new concepts in software security by learning how to create exploits for vulnerable softwares
  • More details


    Description

    In this course of Exploit Development Tutorial for Beginners to Advanced Hacks you will learn the skills required to develop and create exploits from linux and windows programs. First this course of Exploit Development Tutorial for Beginners to Advanced Hacks will focus on the basics then it will dive into indepth concepts of vulnerabilites like buffer overflow, stack buffer overflow, heap overflow, format string buffer overflow, Data Execution Prevention, ASLR, SEH exploits, Egg Hunting, Heap sprays, ROP etc. You will learn how to use debuggers like IDA ,gdb, dbgx64, immunity debugger etc in order to develop your own exploit. You will learn how to create you exploits by performing fuzzing, shellcoding, building the payload then triggering the payload after the exploit runs. In this course of Exploit Development Tutorial for Beginners is for begginers as well as advanced hackers who wants to learn in depth skills of exploit development process. Exploit Development process is time consuming and needs basics to be cleared before like you should know how a binary works inside linux and windows. This course of Exploit Development will teach you how to master in developing the zero day exploits in modern binary applications. You will learn most advanced topics of ethical hacking in this course.

    Who this course is for:

    • Ethical Hackers who want to learn the most important skills in hacking which is Exploit Development skills
    • Penetration testers who want to learn Exploit Development skills in Linux and Windows OS
    • Malware Analysts who wants to improve their skills in Exploit Development process in Linux and Windows OS
    • Programmers who want to know how software protections can be bypassed with Exploit Development process in Linux and Windows.
    • Developers who want to improve their secure programming skills by knowing exploit development process in Linux and Windows
    • Computer Science students who wanted to explore new concepts in software security by learning how to create exploits for vulnerable softwares

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Swapnil Singh
    Swapnil Singh
    Instructor's Courses
    I'm just a guy that likes computers, and loves to show off cool things. I am here to show you my talent by sharing my knowledge in Ethical Hacking and Information Security community. I creates quality Ethical Hacking videos to support the Hacking community to grow their knowledge to spread all over the world.  I am very passionate about Hacking and Security So here you will find only Information security contents ( videos, articles). So feel free to support me.I am super thankful for all of your support.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 50
    • duration 14:47:43
    • Release Date 2022/12/06