SANS 660-Advanced Penetration Testing Exploit Writing And Ethical Hacking 2011-2014

SANS 660-Advanced Penetration Testing Exploit Writing And Ethical Hacking-2011-2014
English | Size: 3.35 GB
Category: HACKING | Security

SANS.660-Advanced.Penetration.Testing.Exploit.Writing.And.Ethical.Hacking
Year: 2011-2014
SEC660 starts off by introducing advanced penetration concepts and providing an overview to prepare students for what lies ahead. The focus of day one is on network attacks, an area often left untouched by testers. Topics include accessing, manipulating, and exploiting the network. Attacks are performed against NAC, VLANs, OSPF, 802.1X, CDP, IPv6, VOIP, SSL, ARP, SNMP, and others. Day two starts with a technical module on performing penetration testing against various cryptographic implementations, then turns to PowerShell and post exploitation, escaping Linux restricted environments and Windows restricted desktop environments. Day three jumps into an introduction of Python for penetration testing, Scapy for packet crafting, product security testing, network and application fuzzing, and code coverage techniques. Days four and five are spent exploiting programs on the Linux and Windows operating systems. You will learn to identify privileged programs, redirect the execution of code, reverse-engineer programs to locate vulnerable code, obtain code execution for administrative shell access, and defeat modern operating system controls such as ASLR, canaries, and DEP using ROP and other techniques. Local and remote exploits as well as client-side exploitation techniques are covered. The final course day is devoted to numerous penetration testing challenges that require students to solve complex problems and capture flags. [Read more…]

eLearnSecurity – exploit Development Student (XDS)

eLearnSecurity – exploit Development Student (XDS)
English | Size: 1.99 GB
Category: Programming | E-learning | HACKING | Security | others

The exploit Development Student course (XDS) is an online, self-paced training course built for anyone with little to no background in Exploit Development. XDS is the most comprehensive and practical online course on Exploit Development, since it provides you with not only the fundamentals of Windows and Linux Exploit Development but also covers advanced Windows and Linux Exploit Development techniques, as well as anti-exploit mechanism bypasses. Every knowledge gained in XDS is reinforced with practical exercises. [Read more…]

Exploit Development and Execution with the Metasploit Framework

Exploit Development and Execution with the Metasploit Framework
English | Size: 675.16 MB
Category: HACKING | Security

As a security professional learning the ins and outs of exploitation can be challenging. In this course, Exploit Development and Execution with the Metasploit Framework, you’ll develop an understading of assembly language so you can use it to exploit software applications. First, you’ll learn the basics of efficiently using assembly language in practice. Next, you’ll be introduced and explore reverse engineering. Finally, you’ll discover how to utilize the Metasploit Framework for exploitation. By the end of this course, you’ll have an understanding of the basics of exploitation, and will have an idea of how this looks in practice. [Read more…]

eXploit Development Student Version 1

eXploit Development Student Version 1
English | Size: 1.99 GB
Category: Security

The eXploit Development Student course (XDS) is an online, self-paced training course built for anyone with little to no background in Exploit Development. XDS is the most comprehensive and practical online course on Exploit Development, since it provides you with not only the fundamentals of Windows and Linux Exploit Development but also covers advanced Windows and Linux Exploit Development techniques, as well as anti-exploit mechanism bypasses. Every knowledge gained in XDS is reinforced with practical exercises. [Read more…]

Reverse Engineering and Exploit Development

Reverse Engineering and Exploit Development
English | Size: 1.29 GB
Category: Tutorial


In this Reverse Engineering and Exploit Development training course, expert author Philip Polstra will teach you about common software vulnerabilities and how to find them, as well as how the vulnerabilities differ between various operating systems. This course is designed for beginners who are looking to get started in security, penetration testing, and reverse engineering.
[Read more…]

SANS SEC760 Advanced Exploit Development for Penetration Testing [Text 2016]

SANS SEC760: Advanced Exploit Development for Penetration Testing [Text 2016]
English | Size: 167.68 MB
Category: Security

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization’s defenses and expose it to significant damage. Few security professionals have the skillset to discover, let alone even understand at a fundamental level, why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems.
[Read more…]

SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES

SANS SEC760: Advanced Exploit Development for Penetration Testers LABFILES
English | Size: 4.46 GB
Category: Security

Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization’s defenses and expose it to significant damage. Few security professionals have the skillset to discover, let alone even understand at a fundamental level, why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems. [Read more…]

SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs

SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs
English | Size: 4.33 GB
Category: Tutorial

SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems. [Read more…]

Pluralsight – Exploit Development and Executon with Metasploit

Pluralsight – Exploit Development and Executon with Metasploit
English | Size: 672.87 MB
Category: CBTS

As a security professional learning the ins and outs of exploitation can be challenging. In this course, Exploit Development and Execution with the Metasploit Framework, you’ll develop an understading of assembly language so you can use it to exploit software applications. First, you’ll learn the basics of efficiently using assembly language in practice. Next, you’ll be introduced and explore reverse engineering. Finally, you’ll discover how to utilize the Metasploit Framework for exploitation. [Read more…]