Exploit Development for Linux (x86)
4.7 (53 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
538 students enrolled

Exploit Development for Linux (x86)

Learn exploit development the right way to crack CTFs and the toughest cyber security certification exams out there
4.7 (53 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
538 students enrolled
Last updated 5/2020
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5.5 hours on-demand video
  • 3 articles
  • 11 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Students will learn assembly language fundamentals for x86 processors
  • Students will learn how to write shellcode on Linux for x86 processors
  • Students will learn practical Linux exploit development concepts
  • Students will learn how to bypass Linux exploit mitigation techniques such as NX and ASLR
Requirements
  • A computer with administrative access, if you want to follow the hands-on exercises.
  • It is good to have knowledge basic on exploit development
Description

This course teaches exploit development for Linux (x86). This course introduces students to the exploit development concepts associated with Linux x86 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting infront of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams. 

Who this course is for:
  • Bug bounty hunters
  • Penetration testers
  • Security Auditors
  • Red Team Operators
  • anyone interested in security.
Course content
Expand all 48 lectures 05:28:13
+ Lab setup
3 lectures 16:48
Installing Ubuntu 16.04 Desktop
04:50
Installing tools in the lab VM
11:49
VM with tools and exploits - Download
00:09
+ x86 Assembly crash course
8 lectures 42:03
Introduction and registers
04:20
MOV instruction and gdb intro
09:26
Accessing sub registers
03:11
ADD, SUB, INC, DEC instructions
04:42
XOR instruction
02:22
PUSH and POP instructions
03:38
CMP and JNE instructions
06:35
CALL, LEAVE, RET instructions
07:49
+ Stack Based Buffer Overflows
10 lectures 01:09:56
Introduction
00:58
Compiling the program - No NX, ASLR & Stack Canary
04:29
Crashing the program
06:56
Finding offset to overwrite EIP
08:14
Finalizing the working exploit
08:59
JMP EAX technique - Introduction
04:19
JMP EAX Exploit
08:42
JMP ESP technique - Introduction
07:36
JMP ESP Exploit
09:08
+ Dealing with Bad characters
3 lectures 23:28
msfvenom and introduction to bad characters
12:57
Identifying bad characters
07:43
Final exploit with shellcode from msfvenom
02:48
+ Writing Shellcode
9 lectures 01:12:38
Introduction
03:32
Exit shellcode - Part 1
06:16
Exit shellcode - Part 2
05:25
Execve shellcode
13:27
Reverse TCP shellcode - Part 1
06:49
Reverse TCP shellcode - Part 2
05:03
Reverse TCP shellcode - Part 3
09:36
Reverse TCP shellcode - Part 4
15:12
Reverse TCP shellcode - Part 5
07:18
+ Bypassing Exploit Mitigation Techniques
5 lectures 33:48
Introduction
01:04
Bypassing NX using Ret2Libc
15:16
Finding string offsets Using Ropper
01:04
Understanding and Bypassing ASLR
10:37
+ Return Oriented Programming
6 lectures 01:02:51
Introduction
07:03
Introduction to mprotect
09:14
Return Oriented Programming - Part 1
21:03
Return Oriented Programming - Part 2
14:37
Return Oriented Programming - Part 3
05:26
Final exploit with rop chain
05:28
+ Bonus section
2 lectures 01:15
More Challenges
01:07
Bonus lecture and Discord
00:07