وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Red Teaming | Exploit Development with Assembly and C |MSAC+

سرفصل های دوره

Exploit Development: Shellcode Execution, Bad Character Analysis, Segmentation Fault Handling, Buffer Overflow, Hacking


1. Introduction
  • 1. Introduction

  • 2. Creating Lab
  • 1. Installing SASM
  • 2. Downloading Ghidra and File Structure
  • 3. Installing JDK in Linux
  • 4. Installing JDK in Windows or MacOS
  • 5. Downloading and Installing IDA Pro IDA Freeware

  • 3. Starting with Ghidra
  • 1. Opening project in Ghidra
  • 2.1 A1 M4lware Sample 1.zip
  • 2. Discovering Ghidra

  • 4. Malware Analysis and Reverse Engineering with Ghidra
  • 1.1 A1 M4lware Sample 1.zip
  • 1. Starting Real Malware Analysis with Ghidra
  • 2. Analyzing Suspicious String using Ghidra
  • 3. OSINT for Reverse Engineering
  • 4. Analyzing Libraries that Malware Uses
  • 5. Extracting SYS file from Malware
  • 6. Finding Entry Points and Changing Undefined Function Names

  • 5. Binary Analysis
  • 1. Analysis of Binary and 4 Stages of Compilation
  • 2. Preprocessing
  • 3. Compilation Phase
  • 4. Assembly Phase
  • 5. Linking Phase

  • 6. Symbols, Stripped and Not Stripped Binaries
  • 1. Using READELF for Viewing Symbolic Information
  • 2. Revealing Contents of Object File
  • 3. Trying to Analyze Binary Executable
  • 4. How binary loads and executes in theory

  • 7. Linux - ELF Format
  • 1. Exploring the Executable and Linkable Format (ELF) and Executable Header
  • 2. Learning ELF Fields
  • 3. Learning ELF Program Header Fields

  • 8. Windows - PE Format
  • 1. Fundamentals of Windows PE Format

  • 9. IDA Pro IDA Freeware
  • 1. Being friends with IDA
  • 2. Useful Tabs in IDA

  • 10. Writing our first 64Bit Assembly Program
  • 1. Hello world with makefile
  • 2. Why nasm is best and compare assemblers
  • 3. Sticking to traditions - Hello world program without makefile

  • 11. Disassembly and Disassembler
  • 1. The Disassembly Theory
  • 2. Disassembly - What

  • 12. Understanding Data Types
  • 1. Understanding CPU architectures and Binaries
  • 2. Converting Decimal to Binary with Basic Math

  • 13. Debugging x86-64
  • 1. Starting gdb and setting flavors
  • 2. Debugging and Finding Variables in Memory addresses
  • 3. Learning more with GDB

  • 14. Writing our second 64Bit Assembly Program
  • 1. Coding ASM file
  • 2. Analyzing Output with GDB and creating makefile

  • 15. OR XOR AND
  • 1. The OR
  • 2. NOT
  • 3. XOR
  • 4. AND

  • 16. Data Display Debugger - DDD
  • 1. Developing another Assembly Program to Analyze with DDD
  • 2. Analyzing Previously Written Code
  • 3. Using DDD and Analyzing RAX Values

  • 17. Jump and Loop
  • 1. Errors and Solutions.html
  • 2.1 A1 - code.txt
  • 2. Using Conditions and Jumping
  • 3.1 A2.txt
  • 3. Jump if equal
  • 4.1 A3.txt
  • 4. Jump if Not Equal
  • 5.1 A4.txt
  • 5. Jump if Greater
  • 6.1 A5.txt
  • 6. Greater than or Equal to
  • 7.1 A6.txt
  • 7. Jump if Less
  • 8.1 A7.txt
  • 8. Jump if less or equal
  • 9.1 A8.txt
  • 9. Jump if Above
  • 10.1 A9.txt
  • 10. Jump if Above or Equal
  • 11.1 A10.txt
  • 11. Jump if below
  • 12.1 A11.txt
  • 12. Jump if below or equal

  • 18. Assembly Project using Jump and Loop
  • 1.1 a1.txt
  • 1. Developing Loop and Calculator Project with Assembly
  • 2.1 a2.txt
  • 2. Testing our Project

  • 19. Memory Manipulation
  • 1.1 a1.txt
  • 1. Project EXABYTE
  • 2. Testing and Analyzing Project with Readelf and GDB

  • 20. Calculator with Assembly
  • 1. Defining variables
  • 2.1 a2.txt
  • 2. Addition and Subtraction
  • 3.1 a3 - fixed.txt
  • 3. Last Decorations
  • 4.1 a4.txt
  • 4. Explaining Registers in Practice
  • 5.1 a5.txt
  • 5. Completing Section

  • 21. First but not last SHELLCODE
  • 1. Developing our own Shellcode and Segmentation fault
  • 2. Discovering Bad Characters but we have one more thing to do
  • 3. Fixing all Bad Characters
  • 4. Segmentation FAULT AGAIN !!!!
  • 5. SHELLCODE EXECUTED - SYSTEM HACKED
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 20671
    حجم: 5369 مگابایت
    مدت زمان: 730 دقیقه
    تاریخ انتشار: 15 مهر 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید