Buffer Overflow Shellcode [FREE COURSE CONTENT]


In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi,  we'll see how to exploit buffer overflow with shellcode. It's a simple example that will allow you to understand the intricacies of this technique and use it for work and for fun. Dive in! 

This course is designed for security experts who want to combine vulnerability knowledge with offensive programming and system skills to take over a Linux-based environment. The course will cover all aspects of Linux exploitation.

Your instructor: Ali Abdollahi

An information security consultant with over 8 years of experience working in a variety of security fields. Currently the cybersecurity division manager, Instructor, author, and board of review member at Hakin9, Pentest & eForensic magazines. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs, author of books and some articles in the field of cybersecurity. Ali is a regular speaker at industry conferences.





Who is this course for? 

Penetration testers, Vulnerability researchers, Security Analysts, DevOps/DevSecOps, Bug hunters

Why take it NOW? 

Today, every pentester and security expert wanting to take their skills to the next level and stand out from the crowd should look into exploit development. This course will give you a deep understanding of advanced exploit development in the Linux environment.

Why THIS course? 

This is the ultimate guide and training you can find to cover Linux exploit development essentials and advanced topics. It’s hands-on and practical, and you can start applying your new skills in your work right away.

In Module 1: 

This module reviews essentials of Linux stack overflow vulnerabilities and the required debugging tools. Everything will be covered in practical scenarios, through finding stack overflow vulnerabilities, binary exploitation, and executing shellcode.

Covered topics: Linux Internals, Buffer overflow in Linux, Heap overflow, ELF, PLT, GOT, SGID, SUID, Abusing EIP

Related content:

April 26, 2022
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023