Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson focuses on public exploits and writing an exploit in the Perl programming language. Participants learn how to re-generate shell code in order to write an exploit.
Module 1 - Linux
Module 2 - Programming
Module 3 - Metasploit
Module 4 - Information Gathering
Module 5 - Vulnerability Discovery/Scanning
Module 6 - Traffic Capture
Module 7 - Exploitation
Module 8 - Passwords
Module 9 - Advanced Exploitation
Module 10 - Post Exploitation
Module 11 - WebApps
Module 12 - Exploit Development
Founder and CTO at Shevirah and Bulb Security LLC
Subscribe to become an Insider Pro and get access to premium content such as: