Resource Development with GDB
Offered By: Pluralsight
Course Description
Overview
Unlock the power of GDB in red team operations. In this course, you'll learn MITRE's resource development tactics using the GDB debugger.
Complex software systems often contain vulnerabilities that can be exploited for malicious purposes. In this course, Resource Development with GDB, you’ll cover how to utilize the GNU Debugger (GDB) to execute resource development techniques in a red team environment. First, you’ll demonstrate how to identify and exploit a buffer overflow vulnerability. Next, you’ll apply GDB to analyze and bypass a software protection mechanism. Finally, you’ll simulate a scenario where these techniques are used to develop effective attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1588.002 (Obtain Capabilities: Tool), T1587.001 (Develop Capabilities: Malware) and T1587.004 (Develop Capabilities: Exploit) using GDB. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Complex software systems often contain vulnerabilities that can be exploited for malicious purposes. In this course, Resource Development with GDB, you’ll cover how to utilize the GNU Debugger (GDB) to execute resource development techniques in a red team environment. First, you’ll demonstrate how to identify and exploit a buffer overflow vulnerability. Next, you’ll apply GDB to analyze and bypass a software protection mechanism. Finally, you’ll simulate a scenario where these techniques are used to develop effective attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1588.002 (Obtain Capabilities: Tool), T1587.001 (Develop Capabilities: Malware) and T1587.004 (Develop Capabilities: Exploit) using GDB. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.
Syllabus
- Course Overview 1min
- Leveraging GDB for Exploit Development and Malware Crafting 14mins
- Resources 1min
Taught by
Christopher Curry
Related Courses
Arm assembly for HackersUdemy Advanced Debugging with GDB
Write your own Operating System via YouTube Hackaday Supercon 2022 - Charles Lohr - Assembly in 2022 - Yes! We Still Use it and Here's Why
Hackaday via YouTube Raspberry Pi Pico and RP2040 - The Deep Dive
Hackaday via YouTube ARM Assembly and Shellcode Basics - Workshop
44CON Information Security Conference via YouTube