A Course on Intermediate Level Linux Exploitation
The course is designed as a continuation of the Windows Exploit Development workshops by the people at Null Singapore and some pre-requisite knowledge is expected of the following topics:
- An Understanding of x86-64 Assembly
- Familiarity with GDB
- Familiarity with C and Python
- Familiarity with the Standard Jump to Shellcode Exploits
Please do view this 15 minute 'Introduction to Return Oriented Programming' video as a refresher. If you have time, please go through the lesson plan for the video.
- Setting Up the Environment
- How Does a Linux Binary Work? - Skipped for Now
- Introduction to PEDA and Pwntools
- Classic Exploitation Technique
- Linux Binary Protections
- Bypassing NX with Return Oriented Programming
- Bypassing NX with Ret2Libc
- ASLR in Depth
- Bypassing ASLR/NX with Ret2PLT
- Bypassing ASLR/NX with GOT Overwrite
- Memory Leaks - Skipped for Now
- Multi-Stage Exploits
- Format String Vulnerabilties
- Advanced Exercises