The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription
Welcome to the workshop on Linux exploit development. In this workshop, we will explore how you can work on exploit development while being on Linux as an operating system. To complete this workshop, you are supposed to have prerequisite requirements in Linux as an operating system.
Knowledge of TCP/IP protocols
Basic knowledge of Linux as an Operating System
Prior hands-on experience with Linux
Sound Knowledge of “C” programming on Linux
Understand socket programming
The course is self-paced – you can visit the training whenever you want and your content will be there.
Once you’re in, you keep access forever, even when you finish the course.
There are no deadlines, except for the ones you set for yourself.
Setup VM for Ubuntu
What is GCC?
What is GDB?
Linux Key Components
Different types of Shell
Linux File System
What is Inodes?
What is Buffer Overflow?
Types of Buffer Overflows
How to Mitigate Buffer Overflows?
Why you should learn about buffer overflows?
Methods for Buffer overflows testing
Debugging on Linux with GDB
Overwriting EIP register
Download shellcode generator
Coding our Exploit
EIP Value to be used