Final Exam: OS Exploits
IT Security
| Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: OS Exploits will test your knowledge and application of the topics presented throughout the OS Exploits track of the Skillsoft Aspire OS Exploits Journey.
WHAT YOU WILL LEARN
-
Use the windows registry and recognize the different artifacts contained withinuse basic windows and powershell commandsdescribe out-of-order execution and related processor concepts and vulnerabilitiesidentify what to look for using social media and other tools when finding targets for social engineering exercisesrecognize and avoid stack buffer overflowsidentify open-source intelligence gathering techniques and sourcesdescribe how coding errors and vulnerabilities lead to corrupting memoryenumerate data from an ftpdescribe how strings executed dynamically can lead to vulnerabilitiesidentify different windows server operating systems and their various uses within the environmentdescribe the concept of pivoting within a windows environment and typical end goalsuse a ransomware attack as a quick method to clean up post-attackconduct a nmap scan of a windows-based networkrecognize various user levels and methods of privilege escalation within windowsdisable compiler protections to construct and execute shellcode in cname the various user and service accounts within a windows active directory environmentoutline the various methods of attacking ftp servicesoutline how to find vulnerabilities for third-party applicationsdescribe common weaknesses and errors made when working with integers and how to prevent themoutline how to scan a network for open portsstate various methods of attacking the windows rdp serviceapply flags to the gcc compiler to catch string weaknesses by converting warnings into errorsdescribe methods for allocating memorylist various tools and techniques used to enumerate smbdescribe the background of the eternalblue exploit and outline how it works on windows systemstargets for privilege escalation exploits and common privilege control mechanismsrecognize a honeypot and how to avoid falling into their trapillustrate the weaknesses caused by string formatting methodsoutline how smb works and how permissions are setmodify options used to vary the operation of a metasploit command
-
outline what rdp is and how it works within a windows environmentdescribe the nature of out-of-bounds write vulnerabilities and their impactdescribe the features of wmi and how it worksidentify common attacks against legacy windows host-based machinessearch for exploits and shellcodes using exploit databasetargets for exploiting processes and tasks of a running linux systemoutline various methods of attacking smbrecognize and avoid looping off-by-one in a c programview windows event logging in actioncrack an ntlm hash value using several toolsnavigate the basic commands used to prepare exploit tests using metasploitrecognize what an advanced persistent threat (apt) is and methods used to configure themoutline how to scan a system and name tools used to conduct a basic enumerationdescribe a program's structure in memory in terms of address space layoutdefine what psexec is and describe how it worksidentify common attacks against legacy windows server-based machinesuse crackmapexec to steal user credentials from a windows machinerun objdump and readelf to disassemble and inspect a linux programdetect linux security weaknesses using the linux exploit suggester utilityexplore the use of sql injection attacks and protections against them using sqlmaptake and restore snapshots of virtual machines using qemu monitordescribe how data and functionality are protected by separating computing resourcescheck input strings for validity and safetydescribe safeguards and considerations when running insecure programs in virtual environmentsdescribe how strings are exploited in computer programsestablish an approach to using virtual environments to stage exploitsmonitor system information from a staging environment using qemu monitorset up qemu and its dependencies for machine emulation and virtualizationrun gdb to step through and trace debug a c programdescribe the gnu c library (glibc) and how it integrates with the linux kernel
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.