Posts

Showing posts with the label TESTING

Be A White Hat Hacker and Pen Tester

Image
Be A White Hat Hacker and Pen Tester About this Course Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like Metasploit , Scapy and WireShark. The course is divided into the following main sections: Ethical Hacking Concepts -What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques Real World Information Gathering -Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration Scanning and Vulnerability Gathering -Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability

Reverse Engineering, Debugging and Malware Analysis - 2021

Image
What you'll learn Reverse Engineering Malware Analysis Debugging Analysis Types and Reporting Basic Operating System Components Memory Types File System Types R2D2 Malware Analysis Cridex Malware Analysis Volatility Low Level Assembly Debugging Windows Registry Stack Guard Bypass Method Exploitation Low Level View Software Exploitation Requirements Basic Programming Knowledge Description Breaking something down and putting it back together is a process that helps people understand how things were made. A person would be able to redo and reproduce an origami by unfolding it first. Knowing how cars work requires understanding each major and minor mechanical part and their purposes. The complex nature of the human anatomy requires people to understand each and every part of the body. How? By dissecting it. Reverse engineering is a way for us to understand how things were designed, why is it in its state, when it triggers, how it works, and what its purpose is. In effect, t