Quick View
Hands-on Zero Day Exploit
What's included
- Learn about Fuzzing
- Understand about Buffer Overflow Attacks
- Pivoting from One Compromised Windows Machine to Another Box Using RPivot
- Learn how to Offensively Pass Reverse Shells Using SSH Tunneling
- Concealing Your Remote Reconnaissance
- Scanning
- And Crawling Using Tor-over-VPN
- Learn How to Attack a Corporate Ethernet LAN from a Wi-Fi Hotspot Using Proxy ARP Daemons
- Introduction to Egghunters for situations of limited buffer space.
- Understand Reverse and Bind Shells
- Learn about Post Exploitation
- Familiarize with Kali Linux
- Introduction to Exploit Development
- Learn about Debugging Crashed Applications
- Introduction to edb (Evan's Debugger)
- Introduction to gdb (GNU Debugger)
- Introduction to Immunity Debugger
- Learn about Netwide Assembly (NASM)
- Familiarize with Metasploit
- Understand Encoding
- Introduction to Pivoting
- Familiarize with Proxies and Transparent Proxifiers (Proxychains)
- Introduction to Tunneling
- Introduction to SSH
- Understanding Network & Security
- Introduction to Hijacking Execution
Our Price:
Regular price
USD
$17.99
Regular price
Sale price
USD
$17.99
Unit price
per
Couldn't load pickup availability
