Companies Home Search Profile

Red Teaming | Exploit Development with Assembly and C |MSAC+

Focused View

OCSALY Academy | 160.000+ Students

12:09:32

56 View
  • 1. Introduction.mp4
    05:48
  • 1. Installing SASM.mp4
    09:48
  • 2. Downloading Ghidra and File Structure.mp4
    11:00
  • 3. Installing JDK in Linux.mp4
    03:14
  • 4. Installing JDK in Windows or MacOS.mp4
    03:51
  • 5. Downloading and Installing IDA Pro IDA Freeware.mp4
    08:49
  • 1. Opening project in Ghidra.mp4
    14:24
  • 2.1 A1 M4lware Sample 1.zip
  • 2. Discovering Ghidra.mp4
    09:04
  • 1.1 A1 M4lware Sample 1.zip
  • 1. Starting Real Malware Analysis with Ghidra.mp4
    07:54
  • 2. Analyzing Suspicious String using Ghidra.mp4
    11:07
  • 3. OSINT for Reverse Engineering.mp4
    05:41
  • 4. Analyzing Libraries that Malware Uses.mp4
    03:12
  • 5. Extracting SYS file from Malware.mp4
    11:46
  • 6. Finding Entry Points and Changing Undefined Function Names.mp4
    04:50
  • 1. Analysis of Binary and 4 Stages of Compilation.mp4
    05:58
  • 2. Preprocessing.mp4
    08:02
  • 3. Compilation Phase.mp4
    05:02
  • 4. Assembly Phase.mp4
    04:24
  • 5. Linking Phase.mp4
    06:37
  • 1. Using READELF for Viewing Symbolic Information.mp4
    06:46
  • 2. Revealing Contents of Object File.mp4
    10:43
  • 3. Trying to Analyze Binary Executable.mp4
    08:56
  • 4. How binary loads and executes in theory.mp4
    06:57
  • 1. Exploring the Executable and Linkable Format (ELF) and Executable Header.mp4
    13:41
  • 2. Learning ELF Fields.mp4
    12:12
  • 3. Learning ELF Program Header Fields.mp4
    14:34
  • 1. Fundamentals of Windows PE Format.mp4
    17:53
  • 1. Being friends with IDA.mp4
    08:27
  • 2. Useful Tabs in IDA.mp4
    07:13
  • 1. Hello world with makefile.mp4
    19:22
  • 2. Why nasm is best and compare assemblers.mp4
    03:06
  • 3. Sticking to traditions - Hello world program without makefile.mp4
    11:43
  • 1. The Disassembly Theory.mp4
    02:25
  • 2. Disassembly - What.mp4
    04:44
  • 1. Understanding CPU architectures and Binaries.mp4
    03:29
  • 2. Converting Decimal to Binary with Basic Math.mp4
    11:10
  • 1. Starting gdb and setting flavors.mp4
    09:21
  • 2. Debugging and Finding Variables in Memory addresses.mp4
    11:07
  • 3. Learning more with GDB.mp4
    10:28
  • 1. Coding ASM file.mp4
    12:03
  • 2. Analyzing Output with GDB and creating makefile.mp4
    17:09
  • 1. The OR.mp4
    06:34
  • 2. NOT.mp4
    04:37
  • 3. XOR.mp4
    06:42
  • 4. AND.mp4
    07:34
  • 1. Developing another Assembly Program to Analyze with DDD.mp4
    11:59
  • 2. Analyzing Previously Written Code.mp4
    09:49
  • 3. Using DDD and Analyzing RAX Values.mp4
    15:52
  • 1. Errors and Solutions.html
  • 2.1 A1 - code.txt
  • 2. Using Conditions and Jumping.mp4
    17:30
  • 3.1 A2.txt
  • 3. Jump if equal.mp4
    05:52
  • 4.1 A3.txt
  • 4. Jump if Not Equal.mp4
    04:06
  • 5.1 A4.txt
  • 5. Jump if Greater.mp4
    07:52
  • 6.1 A5.txt
  • 6. Greater than or Equal to.mp4
    07:40
  • 7.1 A6.txt
  • 7. Jump if Less.mp4
    07:43
  • 8.1 A7.txt
  • 8. Jump if less or equal.mp4
    09:59
  • 9.1 A8.txt
  • 9. Jump if Above.mp4
    11:00
  • 10.1 A9.txt
  • 10. Jump if Above or Equal.mp4
    09:11
  • 11.1 A10.txt
  • 11. Jump if below.mp4
    09:48
  • 12.1 A11.txt
  • 12. Jump if below or equal.mp4
    08:58
  • 1.1 a1.txt
  • 1. Developing Loop and Calculator Project with Assembly.mp4
    08:04
  • 2.1 a2.txt
  • 2. Testing our Project.mp4
    11:52
  • 1.1 a1.txt
  • 1. Project EXABYTE.mp4
    23:56
  • 2. Testing and Analyzing Project with Readelf and GDB.mp4
    21:33
  • 1. Defining variables.mp4
    12:40
  • 2.1 a2.txt
  • 2. Addition and Subtraction.mp4
    11:19
  • 3.1 a3 - fixed.txt
  • 3. Last Decorations.mp4
    16:36
  • 4.1 a4.txt
  • 4. Explaining Registers in Practice.mp4
    11:00
  • 5.1 a5.txt
  • 5. Completing Section.mp4
    10:20
  • 1. Developing our own Shellcode and Segmentation fault.mp4
    19:46
  • 2. Discovering Bad Characters but we have one more thing to do.mp4
    10:49
  • 3. Fixing all Bad Characters.mp4
    06:33
  • 4. Segmentation FAULT AGAIN !!!!.mp4
    20:21
  • 5. SHELLCODE EXECUTED - SYSTEM HACKED.mp4
    17:57
  • Description


    Exploit Development: Shellcode Execution, Bad Character Analysis, Segmentation Fault Handling, Buffer Overflow, Hacking

    What You'll Learn?


    • Mastering Shellcode Execution: Gain a comprehensive understanding of shellcode execution techniques and their role in system hacking.
    • Identifying Bad Characters: Learn to identify and handle bad characters in shellcode, ensuring its effectiveness and reliability.
    • Segmentation Fault Analysis: Explore the nuances of segmentation faults and discover strategies to overcome them when executing shellcode.
    • Ethical Hacking Fundamentals: Understand the ethical framework of hacking and how to apply these techniques responsibly.
    • Developing Custom Shellcode: Develop your own custom shellcode to exploit system vulnerabilities effectively.
    • Hands-On Practical Scenarios: Engage in practical demonstrations and exercises to apply theoretical knowledge in real-world scenarios.
    • System Compromise Techniques: Learn techniques to compromise systems ethically by executing shellcode.
    • Vulnerability Exploitation: Discover vulnerabilities within systems and exploit them using shellcode to gain access.
    • Advanced Bad Character Mitigation: Dive deep into advanced techniques for identifying, analyzing, and mitigating bad characters in shellcode.
    • Building Ethical Hacking Skills: Equip yourself with practical skills in ethical hacking, enhancing your cybersecurity expertise.

    Who is this for?


  • For Everyone who wants to learn Shellcode.
  • What You Need to Know?


  • Basic Operating System Understanding
  • More details


    Description

    Are you ready to delve into the exciting world of system hacking and shellcode execution? Welcome to "Mastering System Hacking with Shellcode Execution," the ultimate course that will take you from a beginner to an advanced level in the realm of ethical hacking and cybersecurity.

    In this comprehensive Udemy course, we will guide you through a series of engaging and hands-on lectures that will equip you with the skills and knowledge necessary to execute shellcode effectively and compromise systems ethically. Our carefully curated curriculum includes:

    Module 1: Building the Foundation

    Developing our own Shellcode and Segmentation Fault: Lay the groundwork by understanding shellcode development and its role in system hacking. Learn how to create your own shellcode and identify segmentation faults.

    Module 2: Analyzing and Refining

    Discovering Bad Characters but we have one more thing to do: Dive deeper into the world of bad characters and explore strategies for their discovery and mitigation.

    Fixing all Bad Characters: Uncover advanced techniques for addressing bad characters and ensuring your shellcode remains effective.

    Advancing to System Compromise

    Segmentation FAULT AGAIN !!!: Overcome segmentation faults and gain insights into system vulnerabilities that can be exploited.

    SHELLCODE EXECUTED - SYSTEM HACKED: Witness the culmination of your efforts as you execute shellcode and compromise a system.

    Our course is designed to cater to both beginners and experienced practitioners in the field. Whether you're looking to enhance your ethical hacking skills or you're a cybersecurity enthusiast aiming to expand your knowledge, this course has something valuable to offer.

    Why Enroll?

    Hands-On Experience: Each lecture is accompanied by practical demonstrations, allowing you to apply what you've learned in real-world scenarios.

    Expert Instruction: Our experienced instructors bring a wealth of knowledge to the table, guiding you through complex concepts with clarity.

    Comprehensive Curriculum: Our step-by-step approach ensures you build a strong foundation and gradually progress to more advanced topics.

    Practical Ethical Hacking: Learn hacking techniques within an ethical framework, ensuring you gain skills that are valuable in today's cybersecurity landscape.

    Don't miss this opportunity to become a proficient system hacker with a deep understanding of shellcode execution. Join us now and embark on a journey towards mastering the art of ethical hacking!


    Who this course is for:

    • For Everyone who wants to learn Shellcode.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    OCSALY Academy | 160.000+ Students
    OCSALY Academy | 160.000+ Students
    Instructor's Courses
    The OCSALY’s goal in the next three years, is to teach 2 million people new skills.Also OCSALY’s own courses, which are all available here, we are working with the very best instructors, creating courses to teach the essential skills required by developers, at all levels.One other important philosophy is that our courses are taught by real professionals; software developers, digital forensics investigators with real and substantial experience in the industry, who are also great teachers.  All our instructors are experienced, software developers!Our team is ONLINE creating new courses and answering your questions right now.Whether you are a beginner, looking to learn how to program for the very first time, or to brush up on your existing skills, or to learn new languages, frameworks or skills, the Academy has you covered all resources to learn from professional instructors !
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 73
    • duration 12:09:32
    • Release Date 2023/10/04

    Courses related to C++

    Courses related to Ethical Hacking

    Courses related to Penetration Testing