Ethical Hacking
(Exploits)
Exploitation is a piece of programmed software or script which can allow hackers to take control over a system, exploiting its vulnerabilities. Hackers normally use vulnerability scanners like Nessus, Nexpose, OpenVAS, etc. to find these vulnerabilities.
Topics Cover In This Course
Introduction:
- Course Introduction
- What you should know before watching this course
- Disclaimer
- What is an exploit
- Introduction to assembler code
- Writing your first assembler program
- Debugging C programs
- Using NASM in Kali
- Extending further with assemblers
- Writing a vulnerable assembler program
- Taking control of flow
- Executing code from the data section
- Attacking with Python
- Attacking the FTP client
- Taking a first look at state-sponsored attacks
- Using Metasploit
- Using Armitage
- Looking at Metasploit modules
- Adding new exploits to Metasploit
- Summary
That Is All
Subscribe To Our YouTube Channel And Stay Tuned
Click Below To Subscribe
⇓
Brought To You Free By VJ SECURITY
Click Below To Download The Course
⇓
0 Comments