Assembly and Buffer Overflow

Price

Application Deadline

11/20/2015

Schedule

24 hours Saturday & Sunday, starting 17:00 – 20:00 21 November 2015 – 13 December 2015
Description:

The Internet is a pervasive force which is working its way into all aspects of our civilization - of this fact there is no doubt. One could spend countless hours, days, and months debating and studying the implications and connotations of this fact and its influence on education, business, etc. However, in studying this medium, it is important to remain cautious and realize the security issues surrounding the Internet. Being overly cautious and conservative in this exploration is detrimental and foolish - others, leaving the paranoid in the dust, will expand the resources left undiscovered by frightened people. It is ultimately more careless to assume that all is legitimate and nothing will harm you. It's that old principle of "that'll never happen to me" that can make one vulnerable. Educated medium should be achieved between these extremes.

This training course is part of six-month program:

Prerequisites

Knowledge in Linux Systems (LINUX 101), Network Architecture, Programming (PYTHON), Metasploit and daily computer skills .

Course Outline

Assembly Language for Hackers (Linux)

System Organization

Virtual Memory Organization

GDB Usage Primer

Hello World

Data Types

Moving Data

Working with Strings

Unconional Branching

Conditiondital Branching

Functions

Functions Stack

Buffer Overflow Primer for Hackers

Smashing the Stack

Writing Exit Shellcode

Executing Shellcode

Disassembling Execve

Shellcode for Execve

Exploiting a Program

Exploiting a Program Demo

Return to Libc Theory

Return to Libc Demo

Week 1

Assembly Language for Hackers (Linux)

System Organization

Virtual Memory Organization

GDB Usage Primer

Hello World

Data Types

Moving Data

Week 2

Assembly Language for Hackers (Linux)

Working with Strings

Unconional Branching

Conditiondital Branching

Functions

11 Functions Stack

Week 3

Buffer Overflow

Smashing the Stack

Writing Exit Shellcode

Executing Shellcode

Disassembling Execve

Week 4

Buffer Overflow

Shellcode for Execve

Exploiting a Program

Exploiting a Program Demo

Return to Libc Theory

Return to Libc Demo

Instructor Profile

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

Instructor
Drinor Selmanaj | Instructor

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

Facebook
Twitter
LinkedIn