Linux Binary Analysis for Ethical Hackers and Pentesters

Master the skills required in Ethical Hacking, Reverse Engineering,Malware Analysis,Exploit Development in this course

3.90 (14 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Linux Binary Analysis for Ethical Hackers and Pentesters
132
students
7 hours
content
Feb 2023
last update
$49.99
regular price

What you will learn

This tutorial will teach students the inner working of Binary files ( ELF formats ) and methods used by malware analysts for malware analysis

In this tutorial you will learn about Basics of ELF in Linux UNIX environment. You will learn in depth coverage of binary compilation process of Linux ELF.

You will learn file injection techniques in ELF in Linux OS. You will learn how to do dynamic and static ELF file analysis in linux OS

After taking this course you will feel very confident in the area of malware analysis in linux environment

Why take this course?

If you want to build a career in Ethical Hacking and cyber security you should have the basic understanding of the file(ELF) and system (OS) internal working. If you want to learn about reverse engineering,malware workings and system internal working with the malwares then this course is for you. In this course you will learn the essential parts of Binary (ELF) analysis in Linux (UNIX) Operating System. We will start from the ground level and goes indepth inside the Binary (ELF) in Linux System. After finishing this course you will have a good understanding of the Binary files of how a Binary (ELF) works in Operating system. You will gain confidence and you will be ready to understand the basics of Malware working.

Learning about Binary files is a complex task and needs a lot of time to spend on the internet and books, whatever i have learned from my experience I have shared into this course of Linux Binary Analysis for Ethical Hackers and pentesters.

Binary analysis is the process of identifying an ELF and analyzing its behavior. A Binary analysis may use a variety of tools and techniques to identify malware. These may include static analysis, dynamic analysis, behavioral analysis, network traffic analysis, and forensic analysis.

Reviews

Dennis
March 10, 2023
The instructor is not good at explaining the concepts. For example, in lecture 3 he spends 5 minutes explaining the difference between binary and text files and states the difference is that binaries can be executed and text files cannot. Apparently he is unaware of shared object (.so) binary files which support executable files and equally unaware of scripts, which are executable text files. He should also not recommend executing unknown files without inspecting them first (including text files) to see if they contain a malicious payload. The lectures drag a lot. He is trying to demonstrate techniques on his computer while speaking, and there are frequent lengthy pauses. I have the impression that he just recorded the lectures without scripting what he would say, without rehearsing, and without reviewing them afterward.
Dincer
January 22, 2023
I did take this course to get a nice explanation as an entry for ELF binaries and it did not disappoint. Apart from the the shown binary injection techniques were very interesting. The instructor is very clear to understand, the course does stick to a nice flow. Last, but not least, he answered my Q&A questions very fast and with detail. Nice work El Profesor. Recommendation: Upload the files to github or as resources, please! Thanks, Berlin

Charts

Price

Linux Binary Analysis for Ethical Hackers and Pentesters - Price chart

Rating

Linux Binary Analysis for Ethical Hackers and Pentesters - Ratings chart

Enrollment distribution

Linux Binary Analysis for Ethical Hackers and Pentesters - Distribution chart
4788082
udemy ID
7/18/2022
course created date
9/14/2022
course indexed date
Bot
course submited by