How to use pre-written exploits and customize them to attack a computer
“Don't reinvent the wheel”
Taught by: Peter Zsiros
Length: 6 hours
Bonus exploit writing course with 50% off
Register to this course and we will send you a 50% coupon code for our Basics of stack-based exploit writing course starting 8 December.
Course starts: Sat, Nov 17, 5:30 pm CET, 11:30 am EST, 8:30 am PST
How about using exploits?
Even if you don’t know how to write your own exploit from scratch, there are ready made ones that you can use against a system.
In this course you will learn how to find vulnerabilities, how to find an exploit for the given vulnerabilities and finally, if required, how to customize the exploit against the given system. To achieve this you will learn the basic usage of common vulnerability assessment tools like Nessus, OpenVAS and Nexpose. To find exploits we will use SearchSploit and Metasploit applications. To learn the process and the usage of these tools we will walk you through some step-by-step examples of usage and customization of exploits.
Join our course and start using exploits.
Live instructor-led course
It will be a live course so you will work together simultaneously with the trainer and the other students and will have the possibility to ask your questions. More about live classes
System administrators, security specialists
Operating system usage, basic level networking
We will run maximum 2 virtual machines simultaneously, recommended minimum 8GB memory (2GB for each, and 4 remains to host), about 40GB disk space for virtual machines.
You will be able to use exploits against a system
Session 0 - Preparation and sample video
Session 1 - Vulnerability scanners
Sat, Nov 17, 5:30 pm CET, 11:30 am EST, 8:30 am PST
OpenVAS, simple attacks with Metasploit, SearchSploit
Session 2 - Customization
Sun, Nov 18, 5:30 pm CET, 11:30 am EST, 8:30 am PST
Customization of exploits, customization of post exploitation scripts.