Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Exploit Development For Linux X64

    Posted By: ELK1nG
    Exploit Development For Linux X64

    Exploit Development For Linux X64
    Last updated 7/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.08 GB | Duration: 5h 34m

    Learn x64 Linux exploit development the right way to crack CTFs and the toughest certification exams out there

    What you'll learn
    Students will learn assembly language fundamentals for x64 processors
    Students will learn how to write shellcode on Linux for x64 processors
    Students will learn practical Linux exploit development concepts for x64 processors
    Students will learn how to bypass Linux exploit mitigation techniques such as NX, Stack Cookies and ASLR
    Requirements
    A computer with administrative access, if you want to follow the hands-on exercises.
    It is good to have knowledge basic on exploit development
    Description
    This course teaches exploit development for Linux (x86_64). This course introduces students to the exploit development concepts associated with Linux x86_64 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.  [IMPORTANT NOTES]: This is an ongoing course and new content will be uploaded progressively.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Section 2: x64 Assembly Crash Course

    Lecture 2 Introduction

    Lecture 3 MOV Instruction

    Lecture 4 Sub registers

    Lecture 5 ADD, SUB, INC, DEC Instructions

    Lecture 6 Avoiding Null Bytes

    Lecture 7 XOR instruction

    Lecture 8 PUSH & POP Instructions

    Lecture 9 CMP & JMP Instructions

    Lecture 10 CALL & RET Instructions

    Section 3: Exploit Development

    Lecture 11 Introduction

    Lecture 12 Compiling the vulnerable program

    Lecture 13 Crashing the program

    Lecture 14 Finding the offset

    Lecture 15 Final Exploit

    Lecture 16 Updating the exploit to work with gets function

    Lecture 17 jmp rax exploit - introduction

    Lecture 18 jmp rax exploit

    Lecture 19 jmp rsp exploit - introduction

    Lecture 20 jmp rsp exploit

    Section 4: Writing Shellcode

    Lecture 21 Introduction

    Lecture 22 The process of writing shellcode

    Lecture 23 Exit shellcode - Part 1

    Lecture 24 Exit shellcode - Part 2 (Removing null bytes)

    Lecture 25 Execve shellcode

    Lecture 26 Reverse tcp shellcode - Part 1

    Lecture 27 Reverse tcp shellcode - Part 2

    Lecture 28 Reverse tcp shellcode - Part 3

    Section 5: Exploit mitigation techniques and bypasses

    Lecture 29 Introduction

    Lecture 30 Understanding NX

    Lecture 31 Return to Libc Attack - Part 1

    Lecture 32 Return to Libc Attack - Part 2

    Lecture 33 Return to Libc Attack - Part 3

    Section 6: Return Oriented Programming

    Lecture 34 Introduction to Return Oriented Programming

    Lecture 35 Introduction to mprotect

    Lecture 36 Return Oriented Programming to bypass NX [to be uploaded]

    Section 7: PLT and GOT

    Lecture 37 Introduction to PLT & GOT

    Lecture 38 Ret2plt to bypass NX & ASLR

    Section 8: Conclusion

    Lecture 39 Course Conclusion

    Section 9: Bonus Section

    Lecture 40 Bonus Lecture

    Bug bounty hunters,Penetration testers,Security Auditors,Red Team Operators,Anyone interested in security.