Welcome to the new course of advanced exploitation techniques. In this course you will be presented with core concepts of hacking by means of exploiting buffer overflows with end-to-end walkthrough of exploitation for a known vulnerability.
In today’s world of information security wars, it is important, or we can say mandatory, for security professionals to gain more advanced knowledge and keep their knowledge up to date. They should also have thorough hands on experience so they can protect their enterprise’s information for which they are hired. It’s not for beginners as we expect that you already have a basic
understanding of concepts presented in this course. Keep in mind that this course is presented solely for educational purposes and not for any unethical act or any type of cyber crime.
This workshop is not designed from scratch, however, if you are a newbie and don’t know much on how to setup your home environment for practicing hacking skills, don’t worry, the last module is dedicated to newbies where you can learn how to setup your home lab and what additional knowledge you need to progress in cyber security and ethical hacking
You should know
We expect that students have prior knowledge in at least the following core
Requirements of the course:
1. Understands concepts of TCP/IP
2. Core concepts of assembly language
3. Working experience with FTP Servers
4. Understanding of applications like FTP
Login To Leave Review
The cyber security attack that started last Friday has dominated the headlines around the world. This reflects the power and reach of the latest mutation of malware spread around a connected world. Unfortunately, the recent ransomware outbreak may be the first of a new strain that we will see terrorising any computer connected to the internet.