The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Welcome to the workshop on Linux exploit development. In this workshop, we will explore how you can work on exploit development while being on Linux as an operating system. To complete this workshop, you are supposed to have prerequisite requirements in Linux as an operating system.

Certificate of completion, no CPE credits


Pre-requisite

    • Knowledge of TCP/IP protocols

    • Basic knowledge of Linux as an Operating System

    • Prior hands-on experience with Linux

    • Sound Knowledge of “C” programming on Linux

    • Understand socket programming


Course format 

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

SYLLABUS


Module 1: SETTING UP THE LINUX ENVIRONMENT

    • Setup VM for Ubuntu
    • What is GCC?
    • What is GDB?

    • GDB Environment


Module 2: LINUX BASICS AND COMMAND LINE 

    •  Linux Key Components

    • Different types of Shell
    • Linux File System
    • What is Inodes?
    • Command Description

Module 3: BUFFER OVERFLOWS

    • The Basics

    • What is Buffer Overflow?
    • Types of Buffer Overflows
    • How to Mitigate Buffer Overflows?
    • Why you should learn about buffer overflows?

    • Methods for Buffer overflows testing


Module 4: VULNERABLE CODE IN “C” LANGUAGE 

    • Debugging on Linux with GDB

    • Overwriting EIP register

    • Labs
    • Examples

Module 5: EXPLOITING THE VULNERABLE CODE ON LINUX

    • Controlling EIP

    • Download shellcode generator

    • Coding our Exploit

    • EIP Value to be used

Module 6 

    • Workshop eBook

Course Reviews

1

1
1 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars1
  1. A very very basic introduction to buffer overflow and its exploitation

    1

    I think this course is too basic and the a lot of information are missing at the end to easily understand how to exploit buffer overflow, far better tutorials are available on the net.

TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
813 STUDENTS ENROLLED

Who’s Online

Profile picture of kalpeshvyas

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013