Categories: Linux administration, Networking, Security
This course covers low level attacks against x86 (32 and 64 bit) architecture. Agenda includes bypassing of strengthening mechanisms.
Participants of this course are required to have participated in Linux – application and kernel debugging course or have comparable knowledge.
Techniques presented during the classes serve only the educational purpose. Please note that in certain circumstances using them might be against the law.
Duration
5 days
Agenda
- Introduction
- Aim of attack
- Available means (remote, local)
- Low level attacks (x86 and x86_64)
- Format string
- buffer overflow – stack, heap
- Bypassing of exploitation prevention mechanisms
- Bypassing DEP
- Bypassing ASLR
- Security analysis and evaluation of applications meant to operate in the system
Audience and prerequisites
Good knowledge of C programming and x86 architecture. Basic knowledge of Assembler. Basic knowledge of Python programming. Basic knowledge of Linux.
Certificates
Course participants receive completion certificates signed by ALX.