This course teaches exploit development concepts for Linux (x86_64) and it is specifically focused on format string vulnerabilities. This course begins by introducing students to the format string concepts on Linux x86_64 platform (though the concepts remain the same on other architectures too). We will slowly gear towards understanding how format string vulnerabilities can be leveraged to exploit other vulnerabilities such as Buffer Overflows. This is clearly taught in the course by showing various practical examples such as bypassing stack canaries and bypassing ASLR. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development concepts surrounding format string vulnerabilities and memory leaks specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.