Linux Kernel Security Internal for Ethical Hackers Language: English | Size:8.59 GB Genre:eLearning
Files Included :
1 Goal of this course.mp4 (28.83 MB) MP4 2 Who can take this course.mp4 (32.11 MB) MP4 3 What skills are needed to follow this course.mp4 (15.04 MB) MP4 1 Lab Setup Part 1.mp4 (67.63 MB) MP4 2 Lab configurations part 2.mp4 (62.7 MB) MP4 1 What is a Kernel in OS.mp4 (89.2 MB) MP4 10 Understanding Character device module structure.mp4 (277.07 MB) MP4 11 Coding our Character device module.mp4 (329.74 MB) MP4 12 Writing code for reading and writing data to the character Device.mp4 (349.86 MB) MP4 2 How to load a Kernel Module inside a running kernel.mp4 (155.89 MB) MP4 3 How we can interact with the kernel.mp4 (80.16 MB) MP4 4 Writing our first Hello World Kernel Module.mp4 (294.1 MB) MP4 5 Basic Components to load a syscall module inside kernel.mp4 (122.03 MB) MP4 6 Coding our own System call module in kernel.mp4 (312.86 MB) MP4 7 Calling and Executing our own syscall function from the kernel.mp4 (200.04 MB) MP4 8 Core functions for data transmission between user space and kernel space.mp4 (160.11 MB) MP4 9 Understanding Character device module by some practical examples.mp4 (216.45 MB) MP4 1 What is Hooking.mp4 (83.22 MB) MP4 2 Understanding System Call Hooking.mp4 (113.78 MB) MP4 3 Writing code for Syscall Hooking.mp4 (269.82 MB) MP4 4 Understanding the concept of accessing the hooked syscall arguments.mp4 (244.71 MB) MP4 5 Writing code for accessing the hooked syscall arguments.mp4 (407.78 MB) MP4 6 Concept of creating a rootkit for keylogging linux admin login panel.mp4 (94.36 MB) MP4 7 Coding a rootkit which sends the linux admin login panel data to the hacker.mp4 (452.14 MB) MP4 1 What is Kernel Object Manipulation.mp4 (65.87 MB) MP4 10 But there is a problem with our rootkit, lets fix that.mp4 (147 MB) MP4 11 Building a rootkit that hides a file from the system.mp4 (274.73 MB) MP4 12 Coding the rootkit that hides a file from the system.mp4 (635.31 MB) MP4 2 Code structure of a rootkit which hides a running process.mp4 (435.96 MB) MP4 3 Writing code for rootkit which hides the running process.mp4 (589.76 MB) MP4 4 Making our process hiding rootkit more reliable.mp4 (285.44 MB) MP4 5 Concept of creating a rootkit which hides a tcp port in Linux.mp4 (345.56 MB) MP4 6 Coding and Testing our port hiding rootkit in Linux.mp4 (613.46 MB) MP4 7 Basic design concept of a rootkit which redirects the binary execution.mp4 (295.85 MB) MP4 8 Creating binary files for proof of concept.mp4 (45.93 MB) MP4 9 Coding and testing our rootkit which redirects the binary execution.mp4 (604.31 MB) MP4