We may earn an affiliate commission when you visit our partners.
Matt Glass

In this course you will learn execution and defense evasion using Donut.

Read more

In this course you will learn execution and defense evasion using Donut.

Are you looking for a tool to generate shellcode for use on Windows machines? In this course, Execution with Donut, you'll learn how to utilize Donut to execute malicious code in a red team environment. First, you'll see how to use Donut to generate shellcode from an executable. Next, you'll explore this technique to generate shellcode from a common C2 application. Finally, you'll learn defense evasion techniques by executing the shellcode on a remote host. When you're finished with this course, you'll have the skills and knowledge to execute these techniques: Native API - ID: T1106, Portable Executable Injection – ID: T1055.002, and Dynamic-link Library Injection – ID: T1055.001. Knowing how these techniques can be used against you will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Enroll now

What's inside

Syllabus

Course Overview
Execution with Donut
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches a how to evade defenses
Provides hands-on experience with Donut
Helps learners understand how to use Windows APIs
Taught by experienced cybersecurity instructor, Matt Glass
May require understanding of basic programming concepts
Focuses on a specific tool, Donut, which may not be widely used in the industry

Save this course

Save Execution with Donut to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Execution with Donut with these activities:
Review "Metasploit: The Penetration Tester's Guide" by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni
This book covers the basics of using Metasploit, one of the most popular tools used in red team operations for executing shellcode.
Show steps
  • Read Chapters 1-4 to understand the basics of Metasploit.
  • Work through the examples in Chapters 5-8 to learn how to use Metasploit to exploit vulnerabilities.
  • Complete the exercises at the end of each chapter to test your understanding of the material.
Show all one activities

Career center

Learners who complete Execution with Donut will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for analyzing and interpreting data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Information Security Analysts because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Systems Administrator
Systems Administrators are responsible for managing and maintaining computer systems and networks. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Systems Administrators because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Cybersecurity Analyst
Cybersecurity Analysts help protect computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Cybersecurity Analysts because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Network Security Engineers because it can be used to execute malicious code on a remote host, allowing them to test the security of networks and identify vulnerabilities.
Security Consultant
Security Consultants help organizations protect their computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Security Consultants because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Incident Responder
Incident Responders are responsible for responding to security incidents. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Incident Responders because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Computer Network Architect
Computer Network Architects design, build, and maintain computer networks. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Computer Network Architects because it can be used to execute malicious code on a remote host, allowing them to test the security of networks and identify vulnerabilities.
Penetration Tester
Penetration Testers simulate attacks on computer systems and networks to identify vulnerabilities. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Penetration Testers because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Malware Analyst
Malware Analysts are responsible for analyzing malware to identify its purpose, functionality, and potential impact. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Malware Analysts because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Security Architect
Security Architects are responsible for designing and implementing security measures for computer systems and networks. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Security Architects because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Ethical Hacker
Ethical Hackers are responsible for simulating attacks on computer systems and networks to identify vulnerabilities. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Ethical Hackers because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Vulnerability Assessor
Vulnerability Assessors identify and assess vulnerabilities in computer systems and networks. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Vulnerability Assessors because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Computer Forensic Investigator
Computer Forensic Investigators are responsible for analyzing and interpreting data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Computer Forensic Investigators because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Red Team Operator
Red Team Operators are responsible for simulating attacks on computer systems and networks to identify vulnerabilities. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Red Team Operators because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.
Blue Team Operator
Blue Team Operators are responsible for defending computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They analyze and interpret data on network traffic, system logs, and other security data to detect and respond to security incidents. Donut is a useful tool for Blue Team Operators because it can be used to execute malicious code on a remote host, allowing them to test the security of systems and networks and identify vulnerabilities.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Execution with Donut.
Provides a comprehensive overview of reverse engineering, covering topics such as disassembling, debugging, and analyzing code. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive overview of rootkits, covering topics such as how they work, how to detect them, and how to remove them. It valuable resource for anyone interested in learning more about this topic.
Provides a comprehensive overview of Metasploit, a popular penetration testing framework. It valuable resource for anyone interested in learning more about this tool.
Provides a comprehensive overview of social engineering, covering topics such as how to identify and exploit human vulnerabilities. It valuable resource for anyone interested in learning more about this topic.
Provides a practical guide to penetration testing, covering topics such as reconnaissance, scanning, exploitation, and reporting. It valuable resource for anyone interested in learning more about this field.
Provides a comprehensive guide to open source penetration testing tools, covering topics such as how to install and use these tools. It valuable resource for anyone interested in learning more about this topic.
Provides a comprehensive overview of network security, covering topics such as how to identify and exploit vulnerabilities. It valuable resource for anyone interested in learning more about this field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Execution with Donut.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser