In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi, we'll see how to exploit buffer overflow with shellcode. It's a simple example that will allow you to understand the intricacies of this technique and use it for work and for fun. Dive in!
This course is designed for security experts who want to combine vulnerability knowledge with offensive programming and system skills to take over a Linux-based environment. The course will cover all aspects of Linux exploitation.
Your instructor: Ali Abdollahi
An information security consultant with over 8 years of experience working in a variety of security fields. Currently the cybersecurity division manager, Instructor, author, and board of review member at Hakin9, Pentest & eForensic magazines. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs, author of books and some articles in the field of cybersecurity. Ali is a regular speaker at industry conferences.
Who is this course for?
Penetration testers, Vulnerability researchers, Security Analysts, DevOps/DevSecOps, Bug hunters
Why take it NOW?
Today, every pentester and security expert wanting to take their skills to the next level and stand out from the crowd should look into exploit development. This course will give you a deep understanding of advanced exploit development in the Linux environment.
Why THIS course?
This is the ultimate guide and training you can find to cover Linux exploit development essentials and advanced topics. It’s hands-on and practical, and you can start applying your new skills in your work right away.
In Module 1:
This module reviews essentials of Linux stack overflow vulnerabilities and the required debugging tools. Everything will be covered in practical scenarios, through finding stack overflow vulnerabilities, binary exploitation, and executing shellcode.
Covered topics: Linux Internals, Buffer overflow in Linux, Heap overflow, ELF, PLT, GOT, SGID, SUID, Abusing EIP
- Blog2022.03.28Footprinting Firewalls | Reconnaissance Tutorial [FREE COURSE CONTENT]
- Blog2022.03.17Process Hollowing Malware | Reverse Engineering Tutorial [FREE COURSE CONTENT]
- Blog2022.03.09Sniffing BLE packets | IoT Hacking Tutorial [FREE COURSE CONTENT]
- Blog2022.02.18Pass The Hash Attacks in Active Directory [FREE COURSE CONTENT]