The Complete Ethical Hacking, Pen Testing : System Security
Learn how CPU use registers with the memory also how the vulnerability occurs & how to Exploit it then Learn Malware
4.12 (26 reviews)

2,418
students
1.5 hours
content
Oct 2023
last update
$19.99
regular price
What you will learn
Step by step of how to build your own virtual hacking environment & penetration testing Lab
Step by Step of how to download & install the needed tools
Learn How to use the immunity debugger for system Application debugging
Understand how the CPU use the registers with the Stack
Learn & Understand the buffer overflow, how it occurs
Learn how to Use a debugger to examine the crash
Learn Shellcode & how to generate using MSFVenom
Targeting the EIP register & Exploit buffer overflow vulnerability
Learn & Understand the different types of malware
Learn How to Use NCAT for getting access on a victim's Computer through internal network
Learn How to Use reverse connection for getting access through external network (from the internet)
Learn How to Create a persistent backdoor
Learn How to Use the Metasploit & meterpreter shell for getting access & control on a system
Screenshots




2565346
udemy ID
9/18/2019
course created date
10/20/2019
course indexed date
Bot
course submited by