password : almutmiz.net

 
 
SOFTWARES

كورس استغلال ثغرات Buffer Overflow | فيديو بالعربى من يوديمى

password : almutmiz.net

   

Request course

طلب كورس

Written by sRT*

password : almutmiz.net

   

Request course

طلب كورس

كورس استغلال ثغرات Buffer Overflow | فيديو بالعربى من يوديمى

ethical hacking stack buffer overflow exploitation

هجمات Buffer Overflow تستغل نقاط الضعف في تطبيق بسبب سوء التعامل مع Buffer Overflow التي يتم تقديمها مع بيانات أكثر مما كان يقصد الاحتفاظ بها.

ستتعرف فى هذا الكورس على الأساسيات اللازمة لفهم مدى خطورة نقاط الضعف Buffer Overflow

وكيف يمكن استغلالها من قبل المهاجمين للتحكم الكامل في النظام البعيد.

شاهد الكورس على موقعه الرسمى من هنا

كورس استغلال ثغرات Buffer Overflow | فيديو بالعربى من يوديمى

كورس استغلال ثغرات Buffer Overflow | فيديو بالعربى من يوديمى

What you’ll learn

Basic buffer overflow fuzzing and exploitation

Requirements

Passion

Description

Buffer overflow attacks exploit vulnerabilities in an application due to mishandling of occurrences of data buffers being presented with more data than they were intended to hold.

This course explains the basics needed to understand the criticality of buffer overflow vulnerabilities and how they could be exploited by attackers to take complete control of a remote system.

The course starts with simple introduction about computer main components/structure

and how they components work together to do preliminary functions.

Then we move to seeing these interactions in reality by inspecting simple application execution inside a debugger and how the debugger can help inspection different sections of computer memory.

After that we delve into functions and how do they get executed inside computer memory (stack) in addition to having a quick look into stack layout and architecture.

This is followed by explaining fuzzing basics and how fuzzing could be used to trigger buffer overflow condition

without having any visibility over the application source code.

A popular fuzzer caller Spike is being used during this demonstration in addition

to inspecting network traffic generated by Spike using Wireshark sniffer.

Once buffer overflow condition is triggered, a proper payload will be created that would overwrite EIP register to hijack application execution flow.

After that, Metasploit (the popular exploitation framework) is used to generate shellcode

that will be placed into computer memory to execute arbitrary commands of attacker’s choice.

Who this course is for:

Anyone who wants to understand how buffer overlflow happens and how attackers utilize it to gain access to the vulnerable system

مساحة الكورس 290 ميجا تقريباً

تحميل موفق للجميع

انتهى الموضوع

كلمات دلالية :

كورس استغلال ثغرات Buffer Overflow , تحميل كورس استغلال ثغرات Buffer Overflow, تنزيل كورس استغلال ثغرات Buffer Overflowيوديمى , كورس استغلال ثغرات Buffer Overflow بالعربى

ethical hacking stack buffer overflow exploitation , تحميل كورس ethical hacking stack buffer overflow exploitation , كورس ethical hacking stack buffer overflow exploitation بالعربى

التحميل المباشر

password : almutmiz.net

   

Leave a Comment