In this you’ll learn advanced reconnaissance techniques and stealth strategies, manual and automated techniques for discovering vulnerabilities, how to write exploits, how to use Metasploit’s interchangeable payloads and remote commands , and more.
Modules
Penetration Testing Methodologies
Network Attacks
Network Recon
Windows Shellcode
Linux and Unix Shellcode
Reverse Engineering
Memory Corruption/Buffer Overflow Vulnerabilities
Exploit Creation - Windows Architecture
Exploit Creation - Linux/Unix ArchitectureWeb Application Vulnerabilities
Hidden Content
Course Link
Modules
Penetration Testing Methodologies
Network Attacks
Network Recon
Windows Shellcode
Linux and Unix Shellcode
Reverse Engineering
Memory Corruption/Buffer Overflow Vulnerabilities
Exploit Creation - Windows Architecture
Exploit Creation - Linux/Unix ArchitectureWeb Application Vulnerabilities
Hidden Content
Course Link