Quick View

Hands-on Zero Day Exploit

Skip to product information
1 of 1

Hands-on Zero Day Exploit

Hands-on Zero Day Exploit

What's included
  • Learn about Fuzzing
  • Understand about Buffer Overflow Attacks
  • Pivoting from One Compromised Windows Machine to Another Box Using RPivot
  • Learn how to Offensively Pass Reverse Shells Using SSH Tunneling
  • Concealing Your Remote Reconnaissance
  • Scanning
  • And Crawling Using Tor-over-VPN
  • Learn How to Attack a Corporate Ethernet LAN from a Wi-Fi Hotspot Using Proxy ARP Daemons
  • Introduction to Egghunters for situations of limited buffer space.
  • Understand Reverse and Bind Shells
  • Learn about Post Exploitation
  • Familiarize with Kali Linux
  • Introduction to Exploit Development
  • Learn about Debugging Crashed Applications
  • Introduction to edb (Evan's Debugger)
  • Introduction to gdb (GNU Debugger)
  • Introduction to Immunity Debugger
  • Learn about Netwide Assembly (NASM)
  • Familiarize with Metasploit
  • Understand Encoding
  • Introduction to Pivoting
  • Familiarize with Proxies and Transparent Proxifiers (Proxychains)
  • Introduction to Tunneling
  • Introduction to SSH
  • Understanding Network & Security
  • Introduction to Hijacking Execution
View full details

Our Price:

Regular price USD $17.99
Regular price Sale price USD $17.99
Sale Sold out