Skip to content

Commit d877ff4

Browse files
committed
Updated README.md
1 parent 7ff4bca commit d877ff4

File tree

1 file changed

+26
-14
lines changed

1 file changed

+26
-14
lines changed

README.md

+26-14
Original file line numberDiff line numberDiff line change
@@ -2,19 +2,31 @@
22

33
A Course on Intermediate Level Linux Exploitation
44

5+
## Pre-Requisites
6+
7+
The course is designed as a continuation of the Windows Exploit Development
8+
workshops by the people at Null Singapore and some pre-requisite knowledge is
9+
expected of the following topics:
10+
11+
1. An Understanding of x86-64 Assembly
12+
2. Familiarity with GDB
13+
3. Familiarity with C
14+
4. Familiarity with the Standard Jump to Shellcode Exploits
15+
516
## Syllabus
617

7-
0. Setting Up the Environment
8-
1. How Does a Linux Binary Work?
9-
2. Classic Exploitation Theory
10-
3. Linux Binary Protections
11-
4. The Classic Exploitation Technique
12-
4. Bypassing NX with Return Oriented Programming
13-
5. ASLR in Depth
14-
6. Bypassing ASLR with NX Disabled
15-
7. Bypassing ASLR/NX with Ret2GOT
16-
8. Bypassing ASLR/NX with Ret2Libc
17-
9. Memory Leaks
18-
10. Multi-Stage Ret2Libc
19-
11. Format String Vulnerabilties
20-
12. Bypassing Stack Canaries with Format String Bugs
18+
1. [Setting Up the
19+
Environment](./lessons/0_setting_up_environment/lessonplan.md)
20+
2. How Does a Linux Binary Work?
21+
3. Classic Exploitation Theory
22+
4. Linux Binary Protections
23+
5. The Classic Exploitation Technique
24+
6. Bypassing NX with Return Oriented Programming
25+
7. ASLR in Depth
26+
8. Bypassing ASLR with NX Disabled
27+
9. Bypassing ASLR/NX with Ret2GOT
28+
10. Bypassing ASLR/NX with Ret2Libc
29+
11. Memory Leaks
30+
12. Multi-Stage Ret2Libc
31+
13. Format String Vulnerabilties
32+
14. Bypassing Stack Canaries with Format String Bugs

0 commit comments

Comments
 (0)