Introduction to Exploit/Zero-Day Discovery and Development



Introduction to Exploit/Zero-Day Discovery and Development

Rating 4.23 out of 5 (56 ratings in Udemy)


What you'll learn
  • Fuzzing
  • Buffer Overflow Attacks
  • Pivoting From One Compromised Windows Machine To Another Box Using RPivot
  • How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
  • Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
  • How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
  • Introduction to Egghunters for situations of limited …
Duration 6 Hours 58 Minutes
Paid

Self paced

Beginner Level

English (US)

1287

Rating 4.23 out of 5 (56 ratings in Udemy)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.