The Complete Ethical Hacking, Pen Testing : System Security

Learn how CPU use registers with the memory also how the vulnerability occurs & how to Exploit it then Learn Malware
4.12 (26 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
The Complete Ethical Hacking, Pen Testing : System Security
2,418
students
1.5 hours
content
Oct 2023
last update
$19.99
regular price

What you will learn

Step by step of how to build your own virtual hacking environment & penetration testing Lab

Step by Step of how to download & install the needed tools

Learn How to use the immunity debugger for system Application debugging

Understand how the CPU use the registers with the Stack

Learn & Understand the buffer overflow, how it occurs

Learn how to Use a debugger to examine the crash

Learn Shellcode & how to generate using MSFVenom

Targeting the EIP register & Exploit buffer overflow vulnerability

Learn & Understand the different types of malware

Learn How to Use NCAT for getting access on a victim's Computer through internal network

Learn How to Use reverse connection for getting access through external network (from the internet)

Learn How to Create a persistent backdoor

Learn How to Use the Metasploit & meterpreter shell for getting access & control on a system

Screenshots

The Complete Ethical Hacking, Pen Testing : System Security - Screenshot_01The Complete Ethical Hacking, Pen Testing : System Security - Screenshot_02The Complete Ethical Hacking, Pen Testing : System Security - Screenshot_03The Complete Ethical Hacking, Pen Testing : System Security - Screenshot_04
2565346
udemy ID
9/18/2019
course created date
10/20/2019
course indexed date
Bot
course submited by