Assembly and Buffer Overflow

Assembly and Buffer Overflow

14 February 2015 — 08 March 2015

ICT Courses
Special Focus

The Internet is a pervasive force which is working its way into all aspects of our civilization - of this fact there is no doubt. One could spend countless hours, days, and months debating and studying the implications and connotations of this fact and its influence on education, business, etc. However, in studying this medium, it is important to remain cautious and realize the security issues surrounding the Internet. Being overly cautious and conservative in this exploration is detrimental and foolish - others, leaving the paranoid in the dust, will expand the resources left undiscovered by frightened people. It is ultimately more careless to assume that all is legitimate and nothing will harm you. It’s that old principle of “that’ll never happen to me” that can make one vulnerable. Educated medium should be achieved between these extremes.

This training course is part of six-month program:



Price 150.00 Eur
Application deadline 13 February 2015 (4pm)
(This course has ended)

Course Details


☆  Prerequisites

Knowledge in Linux Systems (LINUX 101), Network Architecture, Programming (PYTHON), Metasploit and daily computer skills .

☆  Course Outline

Assembly Language for Hackers (Linux)

System Organization
Virtual Memory Organization
GDB Usage Primer
Hello World
Data Types
Moving Data
Working with Strings
Unconional Branching
Conditiondital Branching
Functions
Functions Stack
Buffer Overflow Primer for Hackers

Smashing the Stack
Writing Exit Shellcode
Executing Shellcode
Disassembling Execve
Shellcode for Execve
Exploiting a Program
Exploiting a Program Demo
Return to Libc Theory
Return to Libc Demo

☆  Week 1

Assembly Language for Hackers (Linux)

System Organization
Virtual Memory Organization
GDB Usage Primer
Hello World
Data Types
Moving Data

☆  Week 2

Assembly Language for Hackers (Linux)

Working with Strings
Unconional Branching
Conditiondital Branching
Functions
11 Functions Stack

☆  Week 3

Buffer Overflow

Smashing the Stack
Writing Exit Shellcode
Executing Shellcode
Disassembling Execve

☆  Week 4

Buffer Overflow

Shellcode for Execve
Exploiting a Program
Exploiting a Program Demo
Return to Libc Theory
Return to Libc Demo

☆  Instructor Profile - Drinor Selmanaj

Drinor Selmanaj has experience in cyber security. He has been working with FLOSSK for 2 years now he is one of many contributors in Kosovo in many open source projects, he has been doing workshops around Kosovo in data security, also being a FLOSSKie he has been maintaining the network of the SFK (Software Freedom Kosova) the annual conference about open source in Kosovo. His expertise are networks and computer security. While on workdays he is the CEO of HelloWorld, a company which is focused on application development. His passion about computer security and networks never stops. He will be showing some awesome stuff at advanced cyber security training.

☆  The Schedule

24 hours

Saturday & Sunday, starting 17:00 – 20:00

14 February 2015 – 08 March 2015

☆  Contact Information

Innovation Centre Kosovo; Rexhep Mala str. 28A, 10000, Prishtina

training@ickosovo.com; 049 765 567




Assembly and Buffer Overflow

Drinor Selmanaj

Instructor

Drinor Selmanaj is a lecturer, entrepreneur and information security specialist from Kosovo.
He has spent his years consulting, auditing, and hardening IT-infrastructures in companies and organizations across the region.
As a lecturer, he has established a Penetration Testing programme at ICK which seeks to hone the skills of young technology enthusiasts looking into entering the field of cybersecurity.
His entrepreneurial spirit led him to found a software development company called “Hello World!” centered around creating secure and highly functional digital products for local companies and businesses.
He is the CTO and co-founder of “Sentry L.L.C” - one of the first companies in Kosovo to regionally offer products and an extensive list of services in information security.
As a citizen of Kosovo and a member of various hacker communities, Drinor is able to see both the needs of legitimate businesses as well as the needs of a darker digital underground.






BOLD

© ICK — Innovation Centre Kosovo