Skip to content
A Course on Intermediate Level Linux Exploitation
Branch: master
Clone or download
Latest commit 23dba47 May 5, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
lessons Update lessonplan.md Apr 21, 2018
.gitignore Finished sections 6 and 7. Jan 12, 2017
LICENSE
README.md Update README.md Apr 20, 2018
Vagrantfile Update Vagrantfile May 5, 2018
builddocker.sh Completed section 3 Jan 11, 2017
cleanup.sh
deploydocker.sh Completed section 3 Jan 11, 2017
makeall.sh Added more to the Introduction to PEDA and Pwntools section on PEDA Jan 9, 2017

README.md

linux-exploitation-course

A Course on Intermediate Level Linux Exploitation

Pre-Requisites

The course is designed as a continuation of the Windows Exploit Development workshops by the people at Null Singapore and some pre-requisite knowledge is expected of the following topics:

  1. An Understanding of x86-64 Assembly
  2. Familiarity with GDB
  3. Familiarity with C and Python
  4. Familiarity with the Standard Jump to Shellcode Exploits

Please do view this 15 minute 'Introduction to Return Oriented Programming' video as a refresher. If you have time, please go through the lesson plan for the video.

Syllabus

  1. Setting Up the Environment
  2. How Does a Linux Binary Work? - Skipped for Now
  3. Introduction to PEDA and Pwntools
  4. Classic Exploitation Technique
  5. Linux Binary Protections
  6. Bypassing NX with Return Oriented Programming
  7. Bypassing NX with Ret2Libc
  8. ASLR in Depth
  9. Bypassing ASLR/NX with Ret2PLT
  10. Bypassing ASLR/NX with GOT Overwrite
  11. Memory Leaks - Skipped for Now
  12. Multi-Stage Exploits
  13. Format String Vulnerabilties
  14. Advanced Exercises
You can’t perform that action at this time.