Course Overview

Zero-day software vulnerabilities can lurk undetected for years, leaving software users particularly susceptible to hackers. It is a reasonable option for those looking to defend their systems and potentially exploit vulnerabilities in others.

Zero-day attacks target software vulnerabilities, and this course will provide an effective solution to many of those attacks to help you plan and reduce the risk. The course provides insights into zero-day vulnerability research and exploitation.

By the end of the course, you will gain practical experience to detect and protect your system software from malicious hackers.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Hands-on-Zero-Day-Exploit

What You Will Learn

  • Learn about Fuzzing
  • Understand about Buffer Overflow Attacks
  • Pivoting from One Compromised Windows Machine to Another Box Using RPivot
  • Learn how to Offensively Pass Reverse Shells Using SSH Tunneling
  • Concealing Your Remote Reconnaissance
  • Scanning
  • And Crawling Using Tor-over-VPN
  • Learn How to Attack a Corporate Ethernet LAN from a Wi-Fi Hotspot Using Proxy ARP Daemons
  • Introduction to Egghunters for situations of limited buffer space.
  • Understand Reverse and Bind Shells
  • Learn about Post Exploitation
  • Familiarize with Kali Linux
  • Introduction to Exploit Development
  • Learn about Debugging Crashed Applications
  • Introduction to edb (Evan's Debugger)
  • Introduction to gdb (GNU Debugger)
  • Introduction to Immunity Debugger
  • Learn about Netwide Assembly (NASM)
  • Familiarize with Metasploit
  • Understand Encoding
  • Introduction to Pivoting
  • Familiarize with Proxies and Transparent Proxifiers (Proxychains)
  • Introduction to Tunneling
  • Introduction to SSH
  • Understanding Network & Security
  • Introduction to Hijacking Execution

Program Curriculum

  • How Are Zero-day Attacks Discovered?
  • The Ethics of Zero-day Exploits
  • The Exploit Development Process
  • The Cost of Zero-day Attack Protection
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • GDB-PEDA Debugger/Exploit Development Extension Installation
  • Controlling EIP
  • Writing our Proof-of-concept
  • Bad Character Analysis
  • Successful Exploitation
  • Chapter 2 Lab
  • Chapter 2 Quiz

  • SLMail 5.5 and Immunity Debugger Installation
  • Fuzzing
  • Taking Control of EIP
  • Eliminating Bad Characters - Part 1
  • Eliminating Bad Characters - Part 2
  • Locating JMP ESP Instruction and ASLR Bypass - Part 1
  • Locating JMP ESP Instruction and ASLR Bypass - Part 2
  • Locating JMP ESP Instruction and ASLR Bypass - Part 3
  • Exploiting the Target
  • Chapter 3 Lab
  • Chapter 3 Quiz

  • Gaining Control of Execution
  • Constructing Multi-Stage Shellcode
  • Exploiting the Crossfire Application
  • Chapter 4:Quiz

  • Introduction to Egghunters
  • Fuzzing/Proof-of-Concept
  • Hijacking Execution and Short-Jumping to Our Egghunter Space
  • Generating the Egghunter
  • Locating Buffer-space for Our Shellcode
  • Exploitation Attempt
  • Chapter 5 Lab
  • Chapter 5 Quiz

  • Rpivot Usage
  • Using Tor-over-VPN
  • Offensive Shell Passing
  • Offensive Proxy ARP Bridges
  • Chapter 6 Lab
  • Chapter 6 Quiz
Load more modules

Instructor

Dimitris Amprazis

Dimitris Amprazis has Excellent communication and consultating skills with proven abilities in resolving networking, hardware & software related issues. Ha is proficient in Linux Operating system configuration, utilities, and programming. He has extensive knowledge of hardware, software and networking technologies to provide a combination of analysis and support. Dimitris is highly killed in organizing meetings and reviews. Skills: 1. Kali Linux, Parrot Secutiy OS, CentOS, Fedora, Ubuntu, Linux Mint 2. Wireless penetration testing - WPA, WPA2, WEP 3. Network Vulnerability scan and penetration testing.Web 4. Web Application security testing, Vulnerability Assessment, penetration testing and generating reports using tool 5. Password hash cracking MD5, SHA1,SHA2, etc, 6. Experience with tools: Aircrack-ng, Hydra, Burpsuite, Metasploit. OWASP-ZAP, Nmap, Wireshark, Sqlmap, John-Ripper, Nesuss, Nikto, Dirp. 7. Steganography 8. Integration experience on Security information and Event management solutions (SIEM). 9. Network traffic analysis, supervision, filtration and packet dissection with WireShark

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8