Description
Binary exploitation is a fundamental aspect of penetration testing, but learning it can be challenging. This is primarily due to the complexity of binary files and their underlying machine code, as well as their interactions with computer memory and the CPU. To study the fundamentals of binary exploitation, we must first understand computer architecture and the assembly language. To go on to more advanced binary exploitation, we must first understand basic buffer overflow techniques, as well as CPU architecture and CPU registers for 32-bit Windows and Linux systems. Furthermore, a solid foundation in Python programming is required for writing and comprehending exploit code.
Syllabus:
- Introduction to Python 3
- Intro to Assembly Language
- Stack-Based Buffer Overflows on Linux x86
- Stack-Based Buffer Overflows on Windows x86