Hey Guys,
Back with another review and this time, it is ‘The Art of Exploitation’.
This course if taught by Mohamed Atef:-
“Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+”
Course Curriculum
Introduction
- Art Of Exploitation Introduction (1:54)
Vulnerability and Exploit
- 2- What is a Vulnerability and Exploit (4:20)
- 3- Search for Vulnerability and its Exploit (8:03)
- 4. Exploit the Vulnerability (10:34)
- 5- Metasploit (5:39)
- 6- Fast Track (9:46)
- 7- Armitage (8:35)
Buffer Overflow
- 8- What is Buffer Overflow (5:33)
- 9- How to search for Buffer Overflow part 1 (7:40)
- 10 How to search for Buffer Overflow part 2 (6:23)
- 11- Buffer Overflow Part 1 (10:12)
- 12- Buffer Overflow Part 2 (11:42)
- 13- Buffer Overflow Part 3 (11:35)
- 14- Buffer Overflow Part 4 (15:48)
- 15- Buffer Overflow Part 5 (16:37)
- 16- Buffer Overflow Part 6 (13:27)
- 17- Buffer Overflow Part 7 (12:51)
- 18- Another Buffer Overflow Example (6:33)
- 19- Buffer Overflow Exercise (1:51)
So, to start with we have the usual introduction where he explains his experience which is pretty decent to be honest and also what we will learn on the course like vulnerabilities, exploits, buffer overflow and working with scripts.
Under the ‘Vulnerability and Exploit’ section we go through the anatomy of a vulnerability and an exploit, what I liked about this was speaking about what if the target is very careful in opening links and attachments and such, how do we go about looking for a weakness.
We learn how to search for vulnerabilities and exploits using security focus website.
We learn more about metaspoit, fast track and Armitage as well which was good.
Now we are at the reason I took the course, Buffer Overflow.
Start talking about what is a buffer overflow, which is, is an anomaly that occurs, when software-writing data to a buffer overflows buffer’s capacity, which results in adjacent memory locations, being overwritten.
He talks about how to search for a buffer overflow again in security focus.
In the following videos, we get shown different examples of buffer overflows.
Check them out at the following:-
- Station X website = https://www.stationx.net/
- Station X Facebook = https://www.facebook.com/gotostationx/
- Station X Twitter = https://twitter.com/gotostationx/
- Station X LinkedIn = https://www.linkedin.com/company/stationx/
- Station X YouTube = https://www.youtube.com/channel/UC-vWmE-BHcUrYW5zwDijL1g/videos
Take it easy
Alex/Muldwych