Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Exploit Development For Linux X64

Posted By: ELK1nG
Exploit Development For Linux X64

Exploit Development For Linux X64
Last updated 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.08 GB | Duration: 5h 34m

Learn x64 Linux exploit development the right way to crack CTFs and the toughest certification exams out there

What you'll learn
Students will learn assembly language fundamentals for x64 processors
Students will learn how to write shellcode on Linux for x64 processors
Students will learn practical Linux exploit development concepts for x64 processors
Students will learn how to bypass Linux exploit mitigation techniques such as NX, Stack Cookies and ASLR
Requirements
A computer with administrative access, if you want to follow the hands-on exercises.
It is good to have knowledge basic on exploit development
Description
This course teaches exploit development for Linux (x86_64). This course introduces students to the exploit development concepts associated with Linux x86_64 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.  [IMPORTANT NOTES]: This is an ongoing course and new content will be uploaded progressively.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: x64 Assembly Crash Course

Lecture 2 Introduction

Lecture 3 MOV Instruction

Lecture 4 Sub registers

Lecture 5 ADD, SUB, INC, DEC Instructions

Lecture 6 Avoiding Null Bytes

Lecture 7 XOR instruction

Lecture 8 PUSH & POP Instructions

Lecture 9 CMP & JMP Instructions

Lecture 10 CALL & RET Instructions

Section 3: Exploit Development

Lecture 11 Introduction

Lecture 12 Compiling the vulnerable program

Lecture 13 Crashing the program

Lecture 14 Finding the offset

Lecture 15 Final Exploit

Lecture 16 Updating the exploit to work with gets function

Lecture 17 jmp rax exploit - introduction

Lecture 18 jmp rax exploit

Lecture 19 jmp rsp exploit - introduction

Lecture 20 jmp rsp exploit

Section 4: Writing Shellcode

Lecture 21 Introduction

Lecture 22 The process of writing shellcode

Lecture 23 Exit shellcode - Part 1

Lecture 24 Exit shellcode - Part 2 (Removing null bytes)

Lecture 25 Execve shellcode

Lecture 26 Reverse tcp shellcode - Part 1

Lecture 27 Reverse tcp shellcode - Part 2

Lecture 28 Reverse tcp shellcode - Part 3

Section 5: Exploit mitigation techniques and bypasses

Lecture 29 Introduction

Lecture 30 Understanding NX

Lecture 31 Return to Libc Attack - Part 1

Lecture 32 Return to Libc Attack - Part 2

Lecture 33 Return to Libc Attack - Part 3

Section 6: Return Oriented Programming

Lecture 34 Introduction to Return Oriented Programming

Lecture 35 Introduction to mprotect

Lecture 36 Return Oriented Programming to bypass NX [to be uploaded]

Section 7: PLT and GOT

Lecture 37 Introduction to PLT & GOT

Lecture 38 Ret2plt to bypass NX & ASLR

Section 8: Conclusion

Lecture 39 Course Conclusion

Section 9: Bonus Section

Lecture 40 Bonus Lecture

Bug bounty hunters,Penetration testers,Security Auditors,Red Team Operators,Anyone interested in security.