Introduction

This video gives an overview of the technique you'll be learning in this module. It also gives a brief overview of tools and software required for this module.


Download Links to the tools mentioned: 

Kali Linux 2018.1: https://www.kali.org/news/kali-linux-2018-1-release/

Immunity Debugger: https://www.immunityinc.com/products/debugger/

Mona Library: https://github.com/corelan/mona

Axessh 4.2 (target software): https://www.exploit-db.com/apps/12d8cee31a99cdbd7d30ebf5c86c57ca-axessh.exe

Sublime Text Editor: https://www.sublimetext.com/ 

Virtual Box: https://www.virtualbox.org/wiki/Downloads

VMWare: https://www.vmware.com/in/products/workstation-player/workstation-player-evaluation.html

Notepad++: https://notepad-plus-plus.org/download/v7.6.1.html

Python: https://www.python.org/downloads/release/python-2716/

M7-Tools.pdf
ExploitationBasics_M7P1.pdf
Complete and Continue  
Discussion

0 comments