Linux Exploits & Mitigation: Staging for Exploit Analysis
Ubuntu 20.04
| Intermediate
- 14 videos | 1h 4m 29s
- Includes Assessment
- Earns a Badge
Analyzing kernel vulnerabilities requires an environment to carry out the reproduction of exploits. Being able to quickly and securely stage an operating system is essential. In this course, you'll explore virtual environments and stage systems using QEMU. You'll develop an approach to setting up virtual environments for the Linux kernel, complete with network support. You'll install Linux kernels by version and compile Linux kernels from scratch. Next, you'll investigate architectural considerations, emulate architectures in QEMU, and gather system info from your staging environment. Finally, you'll examine vulnerability considerations that might affect the virtual environment itself and identify safeguards for protecting your computing environments when carrying out exploit analysis. By the end of this course, you'll be able to launch an instance of Alpine Linux, configure networking options, and emulate an Alpine Linux ARM variant within a QEMU environment.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseEstablish an approach to using virtual environments to stage exploitsSet up qemu and its dependencies for machine emulation and virtualizationLaunch an instance of alpine linux within a qemu environmentMount the qemu virtual drive to copy files into and out of a qemu virtual machineCompile a version of the linux kernelConfigure networking options in a qemu virtual environment
-
Describe architectural considerations based on the targeted platformEmulate arm in qemu to emulate the alpine linux arm variantTake and restore snapshots of virtual machines using qemu monitorMonitor system information from a staging environment using qemu monitorRecognize escape vulnerabilities from virtual machines to hostsDescribe safeguards and considerations when running insecure programs in virtual environmentsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 11s
-
4m 56sLearn how to establish an approach to using virtual environments to test exploits. FREE ACCESS
-
5m 42sFind out how to set up QEMU and its dependencies for machine emulation and virtualization. FREE ACCESS
-
6m 24sDuring this video, you will learn how to launch an instance of Alpine Linux within a QEMU environment. FREE ACCESS
-
4m 9sIn this video, find out how to mount the QEMU virtual drive so you can copy files into and out of a QEMU virtual machine. FREE ACCESS
-
6m 36sIn this video, you will learn how to compile a version of the Linux kernel. FREE ACCESS
-
6m 52sIn this video, you will learn how to configure networking options in a QEMU virtual machine. FREE ACCESS
-
4mUpon completion of this video, you will be able to describe architectural considerations based on the targeted platform. FREE ACCESS
-
9m 30sTo emulate Alpine Linux ARM variant in QEMU, you need to find out how to emulate ARM. FREE ACCESS
-
3m 29sIn this video, you will take snapshots of virtual machines and restore them using QEMU Monitor. FREE ACCESS
-
4m 31sTo find out how to monitor system information from a staging environment using QEMU Monitor, consult the QEMU Monitor documentation. FREE ACCESS
-
2m 35sAfter completing this video, you will be able to recognize escape vulnerabilities from virtual machines to the host. FREE ACCESS
-
3m 45sAfter completing this video, you will be able to describe safeguards and considerations when running programs in virtual environments. FREE ACCESS
-
50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.