Join Malcolm Shore for an in-depth discussion in this video Understanding code injection, part of Penetration Testing Essential Training.
- [Narrator] The aim of many cyber attacks…is to run malware on a target system.…One way of doing this is to provide…the malware in the form of a Trojan program.…This is a piece of software which…looks legitimate but has malicious…code embedded in it, which executes…when the software is run.…The simplest form of Trojan is…a legitimate use software product,…which has been modified by inserting…a piece of malicious code.…This is possible because an executable…program has a well defined structure…of multiple segments.…
And an attacker can modify these…to suit their own purposes.…Let's look at a Windows executable file.…This is in what's known as a portable…executable or PE format.…The PE file has a glitch in a field…at a known location, that define…what the rest of the file looks like.…An important part of the structure…is the PE header, which contains information,…such as the locations and sizes of the code and data areas,…what operating system the file is intended for,…and the initial stack size.…
It also contains a table of all the sections…
Cybersecurity expert Malcolm Shore reviews popular pen testing tools, as well as the Bash and Python scripting skills required to be able to acquire, modify, and re-use exploit code. He also provides a refresher on Kali Linux and introduces techniques for testing web services. At the end of this course, you'll be prepared to take more advanced training, and to pursue the popular Offensive Security Certified Professional (OSCP) certification.
- Pen testing overview
- Pen testing tools
- Bash scripting
- Python scripting
- Kali and Metasploit
- Web testing
- Finding exploit code
Skill Level Intermediate
Ethical Hacking: Penetration Testingwith Lisa Bock1h 20m Intermediate
1. What is Pen Testing?
2. Pen Testing Tools
3. Bash Scripting
4. Python Scripting
5. Kali and Metasploit
6. Web Testing
7. Understanding Exploit code
What's next1m 27s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.