Skip to content

nnamon/linux-exploitation-course

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

linux-exploitation-course

A Course on Intermediate Level Linux Exploitation

Pre-Requisites

The course is designed as a continuation of the Windows Exploit Development workshops by the people at Null Singapore and some pre-requisite knowledge is expected of the following topics:

  1. An Understanding of x86-64 Assembly
  2. Familiarity with GDB
  3. Familiarity with C and Python
  4. Familiarity with the Standard Jump to Shellcode Exploits

Please do view this 15 minute 'Introduction to Return Oriented Programming' video as a refresher. If you have time, please go through the lesson plan for the video.

Syllabus

  1. Setting Up the Environment
  2. How Does a Linux Binary Work? - Skipped for Now
  3. Introduction to PEDA and Pwntools
  4. Classic Exploitation Technique
  5. Linux Binary Protections
  6. Bypassing NX with Return Oriented Programming
  7. Bypassing NX with Ret2Libc
  8. ASLR in Depth
  9. Bypassing ASLR/NX with Ret2PLT
  10. Bypassing ASLR/NX with GOT Overwrite
  11. Memory Leaks - Skipped for Now
  12. Multi-Stage Exploits
  13. Format String Vulnerabilties
  14. Advanced Exercises

About

A Course on Intermediate Level Linux Exploitation

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •