This course teaches exploit development for Linux (x86). This course introduces students to the exploit development concepts associated with Linux x86 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting infront of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.
What do you learn?
Assembly language fundamentals for x86 processors
Practical Linux exploit development concepts
How to write shell code on Linux fox x86 processors
How to bypass Linux exploit mitigation techniques such as NX and ASLR
A computer with administrative access, if you want to follow the hands-on exercises.
It is good to have basic Knowledge on exploit development
Who is this course for?
Bug bounty hunters
Red Team Operators
Anyone interested in security
- Introduction (0:58)
- Compiling the program - No NX, ASLR & Stack Canary (4:29)
- Crashing the program (6:56)
- Finding offset to overwrite EIP (8:14)
- Using 3rd Party shellcode in the exploit (10:34)
- Finalizing the working exploit (8:59)
- JMP EAX technique - Introduction (4:19)
- JMP EAX Exploit (8:42)
- JMP ESP technique - Introduction (7:36)
- JMP ESP Exploit (9:08)