Linux Exploits & Mitigation: Staging for Exploit Analysis

Ubuntu 20.04    |    Intermediate
  • 14 videos | 1h 4m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 15 users Rating 4.5 of 15 users (15)
Analyzing kernel vulnerabilities requires an environment to carry out the reproduction of exploits. Being able to quickly and securely stage an operating system is essential. In this course, you'll explore virtual environments and stage systems using QEMU. You'll develop an approach to setting up virtual environments for the Linux kernel, complete with network support. You'll install Linux kernels by version and compile Linux kernels from scratch. Next, you'll investigate architectural considerations, emulate architectures in QEMU, and gather system info from your staging environment. Finally, you'll examine vulnerability considerations that might affect the virtual environment itself and identify safeguards for protecting your computing environments when carrying out exploit analysis. By the end of this course, you'll be able to launch an instance of Alpine Linux, configure networking options, and emulate an Alpine Linux ARM variant within a QEMU environment.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Establish an approach to using virtual environments to stage exploits
    Set up qemu and its dependencies for machine emulation and virtualization
    Launch an instance of alpine linux within a qemu environment
    Mount the qemu virtual drive to copy files into and out of a qemu virtual machine
    Compile a version of the linux kernel
    Configure networking options in a qemu virtual environment
  • Describe architectural considerations based on the targeted platform
    Emulate arm in qemu to emulate the alpine linux arm variant
    Take and restore snapshots of virtual machines using qemu monitor
    Monitor system information from a staging environment using qemu monitor
    Recognize escape vulnerabilities from virtual machines to hosts
    Describe safeguards and considerations when running insecure programs in virtual environments
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 11s
  • 4m 56s
    Learn how to establish an approach to using virtual environments to test exploits. FREE ACCESS
  • Locked
    3.  Setting up QEMU
    5m 42s
    Find out how to set up QEMU and its dependencies for machine emulation and virtualization. FREE ACCESS
  • Locked
    4.  Launching Linux in QEMU
    6m 24s
    During this video, you will learn how to launch an instance of Alpine Linux within a QEMU environment. FREE ACCESS
  • Locked
    5.  Mounting Filesystems
    4m 9s
    In this video, find out how to mount the QEMU virtual drive so you can copy files into and out of a QEMU virtual machine. FREE ACCESS
  • Locked
    6.  Compiling Linux Kernels
    6m 36s
    In this video, you will learn how to compile a version of the Linux kernel. FREE ACCESS
  • Locked
    7.  Networking under QEMU
    6m 52s
    In this video, you will learn how to configure networking options in a QEMU virtual machine. FREE ACCESS
  • Locked
    8.  Architectural Considerations
    4m
    Upon completion of this video, you will be able to describe architectural considerations based on the targeted platform. FREE ACCESS
  • Locked
    9.  Emulating Architectures in QEMU
    9m 30s
    To emulate Alpine Linux ARM variant in QEMU, you need to find out how to emulate ARM. FREE ACCESS
  • Locked
    10.  Saving Machine States
    3m 29s
    In this video, you will take snapshots of virtual machines and restore them using QEMU Monitor. FREE ACCESS
  • Locked
    11.  Monitoring System Info
    4m 31s
    To find out how to monitor system information from a staging environment using QEMU Monitor, consult the QEMU Monitor documentation. FREE ACCESS
  • Locked
    12.  Staging Vulnerabilities
    2m 35s
    After completing this video, you will be able to recognize escape vulnerabilities from virtual machines to the host. FREE ACCESS
  • Locked
    13.  Protecting Staging Environments
    3m 45s
    After completing this video, you will be able to describe safeguards and considerations when running programs in virtual environments. FREE ACCESS
  • Locked
    14.  Course Summary
    50s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 10 users Rating 4.8 of 10 users (10)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.5 of 219 users Rating 4.5 of 219 users (219)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 7 users Rating 4.4 of 7 users (7)
Rating 4.7 of 6 users Rating 4.7 of 6 users (6)
Rating 4.5 of 32 users Rating 4.5 of 32 users (32)