• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Exploit Development for Linux x64

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,608
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,600
‎6 Years of Service‎
 
76%
screenshot-2030.png


What you'll learn

    Students will learn assembly language fundamentals for x64 processors
    Students will learn how to write shellcode on Linux for x64 processors
    Students will learn practical Linux exploit development concepts for x64 processors
    Students will learn how to bypass Linux exploit mitigation techniques such as NX, Stack Cookies and ASLR

Requirements

    A computer with administrative access, if you want to follow the hands-on exercises.
    It is good to have knowledge basic on exploit development

Description

This course teaches exploit development for Linux (x86_64). This course introduces students to the exploit development concepts associated with Linux x86_64 binaries. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.

[IMPORTANT NOTES]: This is an ongoing course and new content will be uploaded progressively.

Who this course is for:

    Bug bounty hunters
    Penetration testers
    Security Auditors
    Red Team Operators
    Anyone interested in security.

Code:
https://www.udemy.com/course/64bit-linux-exploit-development

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top