BinExp: Linux Binary Exploitation
Linux Binary Exploitation
Topics
- Lecture 1.
- Memory Layout of the C program.
- ELF binaries.
- Overview of the stack during the function call.
- Assembly code for the function call and return.
- Concept of $ebp and $esp.
- Executable memory.
- Lecture 1.5.
- How Linux finds the binaries utilize?
- Simple exploit using Linux $PATH variable.
- Lecture 2.
- What are stack overflows?
- ASLR (basics), avoiding Stack protection.
- Shellcodes
- Buffer overflow:
- Changing Control of the program to return to some other function
- Shellcode injection in a buffer and spawning the shell
- Lecture 3.
- Shellcode injection with ASLR enabled.
- Environment variables.
- Shellcode injection with ASLR enabled.
- Lecture 3.5
- Return to Libc attacks.
- Spawning shell in the non-executable stack
- Stack organization in case ret2libc attack.
- Lecture 4.
- This folder contains the set of questions to exploit binaries on the concept that we have learned so far.
- Lecture 5.
- What is format string Vulnerability?
- Seeing the content of stack.
- Writing onto the stack.
- Writing to arbitrary memory location.
- Lecture 6.
- GOT
- Overriding GOT entry.
- Spawning shell with format string vuln.
- Lecture 7.
- Heaps
- Arena, Bins, Chunks.
- Use after free exploit.
- Double free exploit.
Download
Copyright (c) 2018 Rohit Sehgal