Unit Description

Topics covered

  • Multi-layer security, NX, and ASLR
  • Library concepts, linking, and GOT overwrite
  • Stack buffer overflow and Return-to-Libc
  • ROP techniques in 64-bit environments

Who should take this unit

  • Individuals interested in system security and exploitation techniques
  • Those looking to understand advanced attack and defense mechanisms

Prerequisite knowledge

  • Basic understanding of computer systems and memory management
  • Familiarity with programming concepts and C/C++ language

Environment

  • Linux environment based on x86-64 architecture (Ubuntu 22.04)
Objectives
NX & ASLR
Mitigation: NX & ASLR
Static Link vs. Dynamic Link
Background: Library - Static Link vs. Dynamic Link
Quiz: Static Link vs. Dynamic Link
[Exercise] Return to Library
Exploit Tech: Return to Library
Return to Library
[Exercise] Return Oriented Programming
Exploit Tech: Return Oriented Programming
rop
[Exercise] Return Oriented Programming - 2
Exploit Tech: ROP x86
Exploit Tech: ROP x64
basic_rop_x64
basic_rop_x86
Rating
10.0 (3)
0
All items must be completed before leaving a rating feedback.
Bypassing NX & ASLR
10.0
(3)
Tier 1 Medium
Retail Price
200 coins
When you subscribe
Free
0% Completed Total 0 completed
Lecture 0 /6
Wargame 0 /4
4
Quiz 0 /1
1
You can access locked objectives by upgrading your plan or purchasing the units separately.