Learn how to identify vulnerabilities in your system by performing ethical hacking for exploits. Cybersecurity expert Malcolm Shore explains how malware works and demonstrates how penetration testers can debug systems and address susceptible areas.
- [Malcolm] While using ethical hacking tools provides an initial entry into a career as a penetration tester, the key to success in such a career is to really understand how malware is able to exploit computer systems. This requires more than just using tools. It requires a deep knowledge of the construction of applications and operating systems, and the ability to deconstruct malware to gain an insight into the techniques it uses, its command and control, and the malicious actions it can undertake.
I'm Malcolm Shore, and I've spent a career helping governments and businesses protect their systems against cyber attacks. In this course, I'll introduce you to the set of skills that characterize the true professional penetration tester. I'll start with assembly language programming, looking at the instruction set and the binary code it produces. I'll show how to create a buffer overflow and gain remote code execution. And we'll look at some exploits using Metasploit. We'll learn how to do reverse engineering using the Hopper tool, and dynamic code analysis using only debug.
When you finish this course, you'll understand the skill set required to be a top performing penetration tester. Now, let's get started with exploits.
Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Writing assembler programs
- Using debugging programs
- Controlling flow
- Executing code from the data section
- Ethical attacking to identify vulnerabilities
- State-sponsored attacks
- Using Metasploit
- Adding new exploits to Metasploit
- Using Armitage