Binary Exploits with Python

Course

Online

£ 13 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Create simple binary exploits with Python.A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.This video course starts with high-level code injection, the simplest sort of exploit. It then explains binary exploits that allow you to skip past unwanted code, such as the password or product key tests, and add Trojan code. You will perform the exploit development process: finding a vulnerability, analyzing a crash in a debugger, creating a crafted attack, and achieving remote code execution on Windows and Linux. You will use the gdb debugger to analyze Linux executables and Python code to exploit them. On Windows, you'll use the Immunity debugger and Python.About The AuthorSam Bowne has been teaching computer networking and security classes at City College San Francisco since 2000. He has given talks and hands-on trainings at DEFCON, HOPE, B-Sides SF, B-Sides LV, BayThreat, LayerOne, Toorcon, and many other schools and conferences. Credentials: PhD, CISSP, DEF CON Black-Badge Co-Winner

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Remove unwanted code such as the password or product key tests, and add Trojan code
Analyze simple Windows executable files and modify them using the Immunity Debugger
Write Python Scripts to perform exploits
Analyze simple Linux executable files and modify them using the gdb debugger

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Language Programming
  • Programming
  • Hacking
  • SQL
  • Linux
  • Windows
  • Information Systems
  • Information Systems management
  • Systems
  • IT

Course programme

Modifying Windows Programs 8 lectures 49:25 The Course Overview This video will give you an overview about the course. EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge Modifying Windows Programs 8 lectures 49:25 The Course Overview This video will give you an overview about the course. EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. The Course Overview This video will give you an overview about the course. This video will give you an overview about the course. This video will give you an overview about the course. EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE EXE Hacking with OllyDbg The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE The aim of this video is to teach you about OllyDbg. • Explore PuTTY and OllyDbg • Learn about searching and breakpoints • Modify the EXE Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Creating Malware with Metasploit The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware The aim of this video is to create Malware. • Get introduced to Kali Linux • Learn about Msfvenom Payloads • Learn how to deliver the Malware Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Adding Trojans to EXE Files Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Learn about adding Trojans. • Redirect code execution with OllyDbg • Know what happens with the INT 3 instruction • Insert real Shellcode Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Introductory Assembly Language The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack The aim of this video is to teach you about introductory assembly language. • Learn about Jasmin, an assembly language simulator • Explore addressing and RAM • Get to know more about stack Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 1: Patching an EXE This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games This video is the 1st Challenge. • Explore Challenge 1A: hacking a game • Learn how to go to the Winners Board • Explore Challenge 1B: hacking three games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 2: Patching 19 and 256 EXEs This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games This video is the 2nd Challenge. • Explore Challenge 2A: hacking 19 games • Explore Challenge 2B: hacking 256 games Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge Challenge 3: Assembly Language Programming This video is the 3rd Challenge. • Know how to perform the final challenge This video is the 3rd Challenge. • Know how to perform the final challenge This video is the 3rd Challenge. • Know how to perform the final challenge Command Injection 5 lectures 19:51 Ping Form (with Challenge) The aim of this video is to teach you Ping form. • Learn about the router configuration page • Create a vulnerable form • Take up the challenge String Overflow (with Challenge) Learn about string overflow. • Exploit the vulnerable C code • Get to know the working of the vulnerable form • Take up the challenge ImageMagick (with Challenge) We’ll continue learning the command injection ImageMagick. • Explore ImageMagick • Demonstrate its command injection vulnerability • Take up the challenge SQL Injection The aim of this video is to cover SQL Injection. • Explore database concepts and SQL • Demonstrate SQL injection SQL Injection Challenges Let’s continue with some SQL Injection challenges. • Challenge 1: display names for administrators • Challenge 2: create a file on my server with your name as filename • Continue working on Challenge 3 and 4 for your practice Command Injection. 5 lectures 19:51 Ping Form (with Challenge) The aim of this video is to teach you Ping form. • Learn about the router configuration page • Create a vulnerable form • Take up the challenge String Overflow (with Challenge) Learn about string overflow. • Exploit the vulnerable C code • Get to know the working of the vulnerable form • Take up the challenge ImageMagick (with Challenge) We’ll continue learning the command injection ImageMagick. • Explore ImageMagick • Demonstrate its command injection vulnerability • Take up the challenge SQL Injection The aim of this video is to cover SQL Injection. • Explore database concepts and SQL • Demonstrate SQL injection SQL Injection Challenges Let’s continue with some SQL Injection challenges e your exploit using Four Write...

Additional information

Binary exploits with Python

Binary Exploits with Python

£ 13 + VAT