PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Linux Kernel Security Internal for Ethical Hackers

Category: Courses / Others
Author: AD-TEAM
Date added: 16.07.2023 :30:26
Views: 17
Comments: 0










Description material

Linux Kernel Security Internal for Ethical Hackers


Linux Kernel Security Internal for Ethical Hackers
Language: English | Size:8.59 GB
Genre:eLearning


Files Included :

1 Goal of this course.mp4 (28.83 MB)
MP4
2 Who can take this course.mp4 (32.11 MB)
MP4
3 What skills are needed to follow this course.mp4 (15.04 MB)
MP4
1 Lab Setup Part 1.mp4 (67.63 MB)
MP4
2 Lab configurations part 2.mp4 (62.7 MB)
MP4
1 What is a Kernel in OS.mp4 (89.2 MB)
MP4
10 Understanding Character device module structure.mp4 (277.07 MB)
MP4
11 Coding our Character device module.mp4 (329.74 MB)
MP4
12 Writing code for reading and writing data to the character Device.mp4 (349.86 MB)
MP4
2 How to load a Kernel Module inside a running kernel.mp4 (155.89 MB)
MP4
3 How we can interact with the kernel.mp4 (80.16 MB)
MP4
4 Writing our first Hello World Kernel Module.mp4 (294.1 MB)
MP4
5 Basic Components to load a syscall module inside kernel.mp4 (122.03 MB)
MP4
6 Coding our own System call module in kernel.mp4 (312.86 MB)
MP4
7 Calling and Executing our own syscall function from the kernel.mp4 (200.04 MB)
MP4
8 Core functions for data transmission between user space and kernel space.mp4 (160.11 MB)
MP4
9 Understanding Character device module by some practical examples.mp4 (216.45 MB)
MP4
1 What is Hooking.mp4 (83.22 MB)
MP4
2 Understanding System Call Hooking.mp4 (113.78 MB)
MP4
3 Writing code for Syscall Hooking.mp4 (269.82 MB)
MP4
4 Understanding the concept of accessing the hooked syscall arguments.mp4 (244.71 MB)
MP4
5 Writing code for accessing the hooked syscall arguments.mp4 (407.78 MB)
MP4
6 Concept of creating a rootkit for keylogging linux admin login panel.mp4 (94.36 MB)
MP4
7 Coding a rootkit which sends the linux admin login panel data to the hacker.mp4 (452.14 MB)
MP4
1 What is Kernel Object Manipulation.mp4 (65.87 MB)
MP4
10 But there is a problem with our rootkit, lets fix that.mp4 (147 MB)
MP4
11 Building a rootkit that hides a file from the system.mp4 (274.73 MB)
MP4
12 Coding the rootkit that hides a file from the system.mp4 (635.31 MB)
MP4
2 Code structure of a rootkit which hides a running process.mp4 (435.96 MB)
MP4
3 Writing code for rootkit which hides the running process.mp4 (589.76 MB)
MP4
4 Making our process hiding rootkit more reliable.mp4 (285.44 MB)
MP4
5 Concept of creating a rootkit which hides a tcp port in Linux.mp4 (345.56 MB)
MP4
6 Coding and Testing our port hiding rootkit in Linux.mp4 (613.46 MB)
MP4
7 Basic design concept of a rootkit which redirects the binary execution.mp4 (295.85 MB)
MP4
8 Creating binary files for proof of concept.mp4 (45.93 MB)
MP4
9 Coding and testing our rootkit which redirects the binary execution.mp4 (604.31 MB)
MP4






Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: