ASSEMBLY AND BUFFER OVERFLOW

ASSEMBLY AND BUFFER OVERFLOW

21 November 2015 — 13 December 2015

ICT Courses

The Internet is a pervasive force which is working its way into all aspects of our civilization – of this fact there is no doubt. One could spend countless hours, days, and months debating and studying the implications and connotations of this fact and its influence on education, business, etc. However, in studying this medium, it is important to remain cautious and realize the security issues surrounding the Internet. Being overly cautious and conservative in this exploration is detrimental and foolish – others, leaving the paranoid in the dust, will expand the resources left undiscovered by frightened people. It is ultimately more careless to assume that all is legitimate and nothing will harm you. It’s that old principle of “that’ll never happen to me” that can make one vulnerable. Educated medium should be achieved between these extremes.



Price 150.00 Eur
Application deadline 20/11/2015
(This course has ended)

Course Details


☆  Prerequisites

Knowledge in Linux Systems (LINUX 101), Network Architecture, Programming (PYTHON), Metasploit and daily computer skills .

☆  Course Outline

Assembly Language for Hackers (Linux)

System Organization
Virtual Memory Organization
GDB Usage Primer
Hello World
Data Types
Moving Data
Working with Strings
Unconional Branching
Conditiondital Branching
Functions
Functions Stack
Buffer Overflow Primer for Hackers

Smashing the Stack
Writing Exit Shellcode
Executing Shellcode
Disassembling Execve
Shellcode for Execve
Exploiting a Program
Exploiting a Program Demo
Return to Libc Theory
Return to Libc Demo

☆  Week 1

Assembly Language for Hackers (Linux)

System Organization
Virtual Memory Organization
GDB Usage Primer
Hello World
Data Types
Moving Data

☆  Week 2

Assembly Language for Hackers (Linux)

Working with Strings
Unconional Branching
Conditiondital Branching
Functions
11 Functions Stack

☆  Week 3

Buffer Overflow

Smashing the Stack
Writing Exit Shellcode
Executing Shellcode
Disassembling Execve

☆  Week 4

Buffer Overflow

Shellcode for Execve
Exploiting a Program
Exploiting a Program Demo
Return to Libc Theory
Return to Libc Demo

☆  Instructor Profile - Drinor Selmanaj

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

☆  The Schedule

24 hours

Saturday & Sunday, starting 17:00 - 20:00

21 November 2015 - 13 December 2015

☆  The price (No discount)

150.00 Eur

☆  Contact Information

Innovation Centre Kosovo; Rexhep Mala str. 28A, 10000, Prishtina

training@ickosovo.com; 049 765 567






BOLD

© ICK — Innovation Centre Kosovo