System Hacking - Linux Advanced
10.0
(2)
Tier 2 Hard Skill Path System Hacking
Learn advanced Linux system hacking techniques and develop exploitation skills through hands-on exercises. This Path is based on Ubuntu 22.04 and18.04 Linux operating system running on the x86-64 architecture.
System Hacking - Linux Advanced
10.0
(2)
Tier 2 Hard Skill Path System Hacking
Learn advanced Linux system hacking techniques and develop exploitation skills through hands-on exercises. This Path is based on Ubuntu 22.04 and18.04 Linux operating system running on the x86-64 architecture.
0% Completed Total 0 completed
Lecture 0 /13
13
Wargame 0 /13
13
Quiz 0 /5
5
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.

Why It's Worth Your Time

Modern Linux systems are protected by various security mechanisms, yet real-world attackers continue to find ways to bypass them and design exploits. This Path offers an in-depth analysis of key Linux system hacking techniques based on real vulnerabilities, focusing on how to bypass security mechanisms through hands-on exercises. Covering advanced topics like master canary, SECCOMP, SROP, _IO_FILE structure manipulation, and environment variable exploitation, this Path systematically builds practical attack skills rather than relying on theory alone. It is the ideal learning track for anyone aiming to develop professional-level Linux system hacking expertise. This Path is explained based on the x86-64 architecture of the Ubuntu 22.04/18.04 Linux operating system.

Topics Covered

  • Understanding SECCOMP and bypass techniques
  • Stack master canary, TLS understanding, and RIP control
  • Manipulating Glibc's structures like _rtld_global and _IO_FILE
  • Leaking memory addresses via __environ
  • Controlling registers using Sigreturn-Oriented Programming (SROP)
  • Building real-world exploits and gaining shell access

Recommended For

  • Those who want to practice advanced Linux exploitation techniques
  • Those aiming to improve vulnerability analysis and exploit design skills
  • Anyone interested in memory manipulation and bypassing system defenses

Prerequisite Knowledge

  • Understanding of Linux system calls and OS internals
  • Knowledge of C/C++ programming and memory structures
  • Experience with assembly language and debugging tools
  • Familiarity with basic system hacking techniques
Unit Composition
Total 6 units
  1. 1
    9.5
    (4)
    9.5
    (4)
    Learn about SECCOMP, a security mitigation for strengthening system security, and how to bypass it for exploitation.
    SECCOMP
    Background: SECCOMP
    Quiz: SECCOMP
    [Exercise] Bypass SECCOMP
    Exploit Tech: Bypass SECCOMP
    Bypass SECCOMP-1
    [Self-practice] SECCOMP
    seccomp
  2. 2
    10.0
    (1)
    300 Coin
    10.0
    (1)
    300 Coin
    Learn about the Master Canary used in stack canary generation and explore techniques to bypass or exploit it.
    Master Canary
    Background: Master Canary
    Quiz: Master Canary
    [Exercise] Master Canary
    Exploit Tech: Master Canary
    Master Canary
    [Self-practice] Master Canary
    master_canary
  3. 3
    9.7
    (3)
    250 Coin
    9.7
    (3)
    250 Coin
    Learn how to exploit a vulnerability in _rtld_global to hijack the execution flow, targeting glibc prior to 2.34.
    _rtld_global
    Background: _rtld_global
    Quiz: _rtld_global
    [Exercise] overwrite _rtld_global
    Exploit Tech: overwrite _rtld_global
    Overwrite _rtld_global
    [Self-practice] rtld
    rtld
  4. 4
    10.0
    (8)
    150 Coin
    10.0
    (8)
    150 Coin
    Learn how to exploit the `__environ` variable in libc, which points to the environment variable area, for attack techniques.
    [Exercise] __environ
    Exploit Tech: __about
    __environ
  5. 5
    200 Coin
    8.7
    (3)
    200 Coin
    Learn about the SROP attack technique and how to use it to bypass binary mitigations.
    Sigreturn-Oriented Programming (SROP)
    Background: SigReturn-Oriented Programming
    Quiz: SigReturn-Oriented Programming
    [Exercise] SigReturn-Oriented Programming
    Exploit Tech: SigReturn-Oriented Programming
    SigReturn-Oriented Programming
    [Self-practice] send_sig
    send_sig
  6. 6
    10.0
    (1)
    650 Coin
    10.0
    (1)
    650 Coin
    Explore file structure manipulation techniques for memory exploitation.
    _IO_FILE
    Background: _IO_FILE
    Quiz: _IO_FILE
    [Exercise] _IO_FILE Arbitrary Address Write
    Exploit Tech: _IO_FILE Arbitrary Address Write
    _IO_FILE Arbitrary Address Write
    [Exercise] _IO_FILE Arbitrary Address Read
    Exploit Tech: _IO_FILE Arbitrary Address Read
    _IO_FILE Arbitrary Address Read
    [Exercise] Bypass IO_validate_vtable
    Exploit Tech: Bypass IO_validate_vtable
    Bypass IO_validate_vtable
    [Self-practice] iofile_aw
    iofile_aw
Reviews
10.0 (2)
1 month ago

마지막에 파일 구조체, vtable 뜯어보는 수업에서 시간을 많이 썼습니다. 이전에 라이브러리 함수를 그냥 쓰기만 했지 소스코드를 직접 분석해본적이 없었어서 그랬던것 같습니다 상당히 어려웠습니다

6 months ago

basic에서 다루지 않은 더 심화적인 내용을 다루어 당장에는 이해하기 힘들 수 있지만 두 번, 세 번 복습을 하다 보면 체득을 하는 데에는 큰 무리가 없는 것 같음. 내용들도 도움이 많이 되는 내용인 것 같다.

0% Completed Total 0 completed
Lecture 0 /13
13
Wargame 0 /13
13
Quiz 0 /5
5
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.