Join Malcolm Shore for an in-depth discussion in this video What you should know before watching this course, part of Ethical Hacking: Exploits.
- [Instructor] This is a practical course and during this course, I'll be using a virtualized environment called VirtualBox. I'll also be using a number of tools, many of which are in the Kali Linux system. If you're not familiar with Kali and virtualization, you should watch my introduction to Kali Linux course which will guide you through installing and using this testing environment. This course takes a fairly deep dive into the construction of malware. I'll be assuming that you understand the basics of networking and are familiar with Windows and Linux.
While not mandatory, it would also be useful to have some knowledge of assembly and machine code.
Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Writing assembler programs
- Using debugging programs
- Controlling flow
- Executing code from the data section
- Ethical attacking to identify vulnerabilities
- State-sponsored attacks
- Using Metasploit
- Adding new exploits to Metasploit
- Using Armitage