Free download » Free download video courses » Linux Rootkits for Red-Blue Teams
| view 👀:99 | 🙍 oneddl | redaktor: FreshWap.CC | Rating👍:

Linux Rootkits for Red-Blue Teams


Linux Rootkits for Red-Blue Teams
 Linux Rootkits for Red-Blue Teams
Genre: eLearning | Language: English
Linux dominates the Server, Embedded and now the Internet of Things (IoT) device market. In recent times, embedded systems and IoT devices in particular have been the weapons of choice in online attacks: botnets like Mirai and Reaper to name a few. Soon the simple attack vectors that these botnets and malware use get patched, it is obvouis that the attacker will move and hide his tools in Kernel mode. This course will teach Red-Blue teams how kernel mode attack kits work and what to go about protecting their systems against it. We will use examples on x86_64, ARM and MIPS based architectures.


This entire course will be run on the latest Linux Kernel 4.15.x. This course is completely hands-on and everything will be taught with practical examples in the form of Kernel Modules written in C. You can however follow this course with a basic knowledge of Linux as we discuss everything from the very basics.
A non-exhaustive list of topics include:
Linux Boot Process
Browsing the Kernel code
Linux Architecture and Process Internals
Loadable Kernel Module (LKM) Programming Basics
Understading internal kernel structures and the syscall mechanism
Interrupt and Process context, Timers and Watchdogs
Manipulating internal process structures
Hijacking the system call table
Subverting kernel memory protections
Monitoring the system with Kprobes
Kernel syncronization methods and common LKM pitfalls
User space - Kernel space data transfers
Monitoring a user space process from the kernel
Accessing user space process memory
Modifying the core kernel code to create custom hooks
Understanding the kernel network stack
Netfilters and Custom Hooks
Network packet filtering and mangling with custom LKMs
Analyzing Kernel mode Rootkits
Defending against Kernel Mode attacks
Chain of trust implementations
and other topics



.html

https://rapidgator.net/file/2c30429135fe25377b29761bd0e1dd46/Linux_Rootkits_for_Red-Blue_Teams.rar.html

⚠️ Dead Link ?
You may submit a re-upload request using the search feature. All requests are reviewed in accordance with our Content Policy.

Request Re-upload
📌🔥Contract Support Link FileHost🔥📌
✅💰Contract Email: [email protected]

Help Us Grow – Share, Support

We need your support to keep providing high-quality content and services. Here’s how you can help:

  1. Share Our Website on Social Media! 📱
    Spread the word by sharing our website on your social media profiles. The more people who know about us, the better we can serve you with even more premium content!
  2. Get a Premium Filehost Account from Website! 🚀
    Tired of slow download speeds and waiting times? Upgrade to a Premium Filehost Account for faster downloads and priority access. Your purchase helps us maintain the site and continue providing excellent service.

Thank you for your continued support! Together, we can grow and improve the site for everyone. 🌐

Comments (0)

Information
Users of Guests are not allowed to comment this publication.