All Tutorials

Format String Vulnerabilities

Format String Vulnerabilities

Learn Format String Vulnerabilities the right way to crack CTFs and the toughest certification exams out there

What you’ll learn

Format String Vulnerabilities

  • Students will learn practical format string vulnerability concepts for x64 processors
  • Students will learn how to leak memory addresses using format string vulnerabilities on Linux for x64 processors
  • Who Students will learn how to bypass stack canaries on Linux for x64 processors
  • Students will learn advanced Linux Binary Exploitation concepts
  • Students will learn how to use their own tools binary exploitation framework

Requirements

  • A computer with administrative access, if you want to follow the hands-on exercises.
  • It is good to have knowledge basic on exploit development

Description

This course teaches exploit development concepts for Linux (x86_64) and it is specifically focused on format string vulnerabilities.
This course begins by introducing students to the format string concepts on Linux x86_64 platform (though the concepts remain the same on other architectures too). We will slowly gear towards understanding how to format string vulnerabilities that can be leveraged to exploit other vulnerabilities such as Buffer Overflows. This is clearly taught in the course by showing various practical examples such as bypassing stack canaries and bypassing ASLR.

This is an entry-level to the intermediate level course and we encourage you to take this course if you are interested to learn to exploit development concepts surrounding format string vulnerabilities and memory leaks specifically for 64-bit Intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and braces yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry-leading practical cybersecurity certification exams.

Who this course is for:

  • Bug bounty hunters
  • CTF Players
  • Penetration testers
  • Security Auditors
  • Red Team Operators
  • Anyone interested in security
  • Last updated 5/2021

Content From: https://www.udemy.com/course/format-string-vulnerabilities/
Download Now

Natural Language Processing With Transformers in Python

Recent Posts

  • Blog

Earn Money from Areena Course

In today's digital age, opportunities for earning money have expanded significantly. One avenue that has… Read More

9 months ago
  • Blog

Best Earning Apps

Earning apps have become increasingly popular as people look for ways to make money conveniently… Read More

11 months ago
  • Blog

How to Earn Money From Markaz App

In today's fast-paced digital world, opportunities to earn money online have become increasingly popular. One… Read More

11 months ago
  • All Tutorials

Full Web Ethical Hacking Course

Full Web Ethical Hacking Course Learn all about web application penetration testing! What you'll learn… Read More

1 year ago
  • All Tutorials

Build Chatbots Using Javascript

Build Chatbots Using Javascript Build Chatbots Using Javascript From Scratch What you'll learn Build Chatbots… Read More

1 year ago
  • All Tutorials

Basic Learning about Linux Daily use commands

Basic Learning about Linux Daily use commands Basic knowledge to get you started What you'll… Read More

1 year ago