Intro to Linux Exploit Development
Offered By: YouTube
Course Description
Overview
Dive into Linux exploit development with this comprehensive conference talk from Hack3rcon 2012. Explore key concepts such as Capture the Flag, compiler usage, ELF headers, and assembly language. Learn about stack operations, buffer overflows, and shell code creation. Examine mitigation techniques, including how to disable stack protection. Engage in hands-on labs to reinforce your understanding of crash analysis and hex manipulation. Gain valuable insights into the world of cybersecurity and ethical hacking through this in-depth presentation.
Syllabus
Capture the Flag
Introduction
Overview
Why
tarballs
helloworld
compiler
elf header
ldd
lab
assembly
stack
stack of plates
push
labs
hello
function call
buffer overflow
shell code
stackoverflow
mitigation techniques
disabling stack protection
crash lab
examine
seas
hex
Related Courses
Software Design Threats and MitigationsUniversity of Colorado System via Coursera Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam Unlocking Information Security I: From Cryptography to Buffer Overflows
Tel Aviv University via edX Unlocking Information Security
Tel Aviv University via edX Buffer Overflow Exploits (Arabic) | OSCP Preparation
Udemy