|
2 | 2 |
|
3 | 3 | A Course on Intermediate Level Linux Exploitation
|
4 | 4 |
|
| 5 | +## Pre-Requisites |
| 6 | + |
| 7 | +The course is designed as a continuation of the Windows Exploit Development |
| 8 | +workshops by the people at Null Singapore and some pre-requisite knowledge is |
| 9 | +expected of the following topics: |
| 10 | + |
| 11 | +1. An Understanding of x86-64 Assembly |
| 12 | +2. Familiarity with GDB |
| 13 | +3. Familiarity with C |
| 14 | +4. Familiarity with the Standard Jump to Shellcode Exploits |
| 15 | + |
5 | 16 | ## Syllabus
|
6 | 17 |
|
7 |
| -0. Setting Up the Environment |
8 |
| -1. How Does a Linux Binary Work? |
9 |
| -2. Classic Exploitation Theory |
10 |
| -3. Linux Binary Protections |
11 |
| -4. The Classic Exploitation Technique |
12 |
| -4. Bypassing NX with Return Oriented Programming |
13 |
| -5. ASLR in Depth |
14 |
| -6. Bypassing ASLR with NX Disabled |
15 |
| -7. Bypassing ASLR/NX with Ret2GOT |
16 |
| -8. Bypassing ASLR/NX with Ret2Libc |
17 |
| -9. Memory Leaks |
18 |
| -10. Multi-Stage Ret2Libc |
19 |
| -11. Format String Vulnerabilties |
20 |
| -12. Bypassing Stack Canaries with Format String Bugs |
| 18 | +1. [Setting Up the |
| 19 | + Environment](./lessons/0_setting_up_environment/lessonplan.md) |
| 20 | +2. How Does a Linux Binary Work? |
| 21 | +3. Classic Exploitation Theory |
| 22 | +4. Linux Binary Protections |
| 23 | +5. The Classic Exploitation Technique |
| 24 | +6. Bypassing NX with Return Oriented Programming |
| 25 | +7. ASLR in Depth |
| 26 | +8. Bypassing ASLR with NX Disabled |
| 27 | +9. Bypassing ASLR/NX with Ret2GOT |
| 28 | +10. Bypassing ASLR/NX with Ret2Libc |
| 29 | +11. Memory Leaks |
| 30 | +12. Multi-Stage Ret2Libc |
| 31 | +13. Format String Vulnerabilties |
| 32 | +14. Bypassing Stack Canaries with Format String Bugs |
0 commit comments