Understanding Linux Kernel Security For Ethical Hackers
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.11 GB | Duration: 8h 52m
Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.11 GB | Duration: 8h 52m
If you want to know how kernel security works as a hacker then this course is for you.
What you'll learn
Primary goal is to expose the learners to rootkits and rootkit writing. After completing this course they have a better understanding of rootkits
You will understand the theory and practical of rootkits. You will start enjoying by creating your own rootkits.
You will have a better understanding of kernel working in the operating system by understanding rootkits design.
This course will build a strong fundations on the kernel hacking area. So after finishing this course you will feel very confident in kernel hakcing.
Requirements
Linux basics
Basic C programming
Description
In this course I will teach you how a kernel security works inside linux operating system.This course is for educational purpose don't use these skills for offensive purpose. Use these skills to understand the different aspects of rootkits inside an operating system for defensive purpose.In this course I will start from the very basics of kernel and will go into indepth adventure of rootkits. So you will feel very curious day by day by following this course.If you are feeling that you don't know about kernel at all don't worry I have made this course such a way that you will not stuck at any point because I have started from very basics as to keep in mind that the learner does'nt know about kernel at all.What are kernel rootkits:A kernel rootkit is a type of malicious software that is designed to operate at the kernel level of an operating system. It is designed to remain hidden and to operate without the knowledge or consent of the user.Kernel rootkits are very dangerous and can be very difficult to detect and remove, because they operate at such a low level of the operating system. They have full access to control all the system resources, including memory, I/O, and system calls, and can intercept and modify system calls to hide their own actions.Kernel rootkits can be used for a variety of malicious purposes, such as allowing an attacker to gain unauthorized access to a system, to steal sensitive information, or to disrupt the operation of the system. They can also be used to create a "backdoor" into a system, allowing an attacker to regain access at a later time.Learning about kernel security and how they work can help individuals and organizations to better understand and defend against these types of threats.For example, understanding the techniques and tactics used by rootkits can help security professionals to design more effective defenses and to identify and mitigate rootkit infections. It can also help individuals to make more informed decisions about the security measures they use to protect their own systems and data.
Overview
Section 1: Introduction
Lecture 1 Goal of this course
Lecture 2 Who can take this course
Lecture 3 What skills are needed to follow this course ?
Section 2: Lab Setup
Lecture 4 Lab Setup Part 1
Lecture 5 Lab configurations part 2
Section 3: Linux Kernel Module Basics
Lecture 6 What is a Kernel in OS ?
Lecture 7 How we can interact with the kernel ?
Lecture 8 How to load a Kernel Module inside a running kernel ?
Lecture 9 Writing our first Hello World Kernel Module
Lecture 10 Basic Components to load a syscall module inside kernel
Lecture 11 Coding our own System call module in kernel
Lecture 12 Calling and Executing our own syscall function from the kernel
Lecture 13 Core functions for data transmission between user space and kernel space
Lecture 14 Understanding Character device module by some practical examples
Lecture 15 Understanding Character device module structure
Lecture 16 Coding our Character device module
Lecture 17 Writing code for reading and writing data to the character Device
Section 4: Hooking
Lecture 18 What is Hooking ?
Lecture 19 Understanding System Call Hooking
Lecture 20 Writing code for Syscall Hooking
Lecture 21 Understanding the concept of accessing the hooked syscall arguments
Lecture 22 Writing code for accessing the hooked syscall arguments
Lecture 23 Concept of creating a rootkit for keylogging linux admin login panel
Lecture 24 Coding a rootkit which sends the linux admin login panel data to the hacker
Section 5: Manipulating Kernel Objects in Linux
Lecture 25 What is Kernel Object Manipulation ?
Lecture 26 Code structure of a rootkit which hides a running process
Lecture 27 Writing code for rootkit which hides the running process
Lecture 28 Making our process hiding rootkit more reliable
Lecture 29 Concept of creating a rootkit which hides a tcp port in Linux
Lecture 30 Coding and Testing our port hiding rootkit in Linux
Ethical Hackers,Penetration testers,Programmers,Cyber security Analysts,Computer Science Students,Malware Analysts,System Administrator