Buffer Overflow Shellcode [FREE COURSE CONTENT]


In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi,  we'll see how to exploit buffer overflow with shellcode. It's a simple example that will allow you to understand the intricacies of this technique and use it for work and for fun. Dive in! 

This course is designed for security experts who want to combine vulnerability knowledge with offensive programming and system skills to take over a Linux-based environment. The course will cover all aspects of Linux exploitation.

Your instructor: Ali Abdollahi

An information security consultant with over 8 years of experience working in a variety of security fields. Currently the cybersecurity division manager, Instructor, author, and board of review member at Hakin9, Pentest & eForensic magazines. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs, author of books and some articles in the field of cybersecurity. Ali is a regular speaker at industry conferences.





Who is this course for? 

Penetration testers, Vulnerability researchers, Security Analysts, DevOps/DevSecOps, Bug hunters

Why take it NOW? 

Today, every pentester and security expert wanting to take their skills to the next level and stand out from the crowd should look into exploit development. This course will give you a deep understanding of advanced exploit development in the Linux environment.

Why THIS course? 

This is the ultimate guide and training you can find to cover Linux exploit development essentials and advanced topics. It’s hands-on and practical, and you can start applying your new skills in your work right away.

In Module 1: 

This module reviews essentials of Linux stack overflow vulnerabilities and the required debugging tools. Everything will be covered in practical scenarios, through finding stack overflow vulnerabilities, binary exploitation, and executing shellcode.

Covered topics: Linux Internals, Buffer overflow in Linux, Heap overflow, ELF, PLT, GOT, SGID, SUID, Abusing EIP

[custom-related-posts title="Related content:" none_text="None found" order_by="title" order="ASC"]

April 26, 2022
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.