Exploit Development For Linux X64
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.08 GB | Duration: 5h 34m
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.08 GB | Duration: 5h 34m
Learn x64 Linux exploit development the right way to crack CTFs and the toughest certification exams out there
What you'll learn
Students will learn assembly language fundamentals for x64 processors
Students will learn how to write shellcode on Linux for x64 processors
Students will learn practical Linux exploit development concepts for x64 processors
Students will learn how to bypass Linux exploit mitigation techniques such as NX, Stack Cookies and ASLR
Requirements
A computer with administrative access, if you want to follow the hands-on exercises.
It is good to have knowledge basic on exploit development
Description
This course teaches exploit development for Linux (x86_64). This course introduces students to the exploit development concepts associated with Linux x86_64 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams. [IMPORTANT NOTES]: This is an ongoing course and new content will be uploaded progressively.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: x64 Assembly Crash Course
Lecture 2 Introduction
Lecture 3 MOV Instruction
Lecture 4 Sub registers
Lecture 5 ADD, SUB, INC, DEC Instructions
Lecture 6 Avoiding Null Bytes
Lecture 7 XOR instruction
Lecture 8 PUSH & POP Instructions
Lecture 9 CMP & JMP Instructions
Lecture 10 CALL & RET Instructions
Section 3: Exploit Development
Lecture 11 Introduction
Lecture 12 Compiling the vulnerable program
Lecture 13 Crashing the program
Lecture 14 Finding the offset
Lecture 15 Final Exploit
Lecture 16 Updating the exploit to work with gets function
Lecture 17 jmp rax exploit - introduction
Lecture 18 jmp rax exploit
Lecture 19 jmp rsp exploit - introduction
Lecture 20 jmp rsp exploit
Section 4: Writing Shellcode
Lecture 21 Introduction
Lecture 22 The process of writing shellcode
Lecture 23 Exit shellcode - Part 1
Lecture 24 Exit shellcode - Part 2 (Removing null bytes)
Lecture 25 Execve shellcode
Lecture 26 Reverse tcp shellcode - Part 1
Lecture 27 Reverse tcp shellcode - Part 2
Lecture 28 Reverse tcp shellcode - Part 3
Section 5: Exploit mitigation techniques and bypasses
Lecture 29 Introduction
Lecture 30 Understanding NX
Lecture 31 Return to Libc Attack - Part 1
Lecture 32 Return to Libc Attack - Part 2
Lecture 33 Return to Libc Attack - Part 3
Section 6: Return Oriented Programming
Lecture 34 Introduction to Return Oriented Programming
Lecture 35 Introduction to mprotect
Lecture 36 Return Oriented Programming to bypass NX [to be uploaded]
Section 7: PLT and GOT
Lecture 37 Introduction to PLT & GOT
Lecture 38 Ret2plt to bypass NX & ASLR
Section 8: Conclusion
Lecture 39 Course Conclusion
Section 9: Bonus Section
Lecture 40 Bonus Lecture
Bug bounty hunters,Penetration testers,Security Auditors,Red Team Operators,Anyone interested in security.