* Cantinho Satkeys

Refresh History
  • JPratas: try65hytr Pessoal  2dgh8i k7y8j0 classic dgf64y
    19 de Dezembro de 2025, 05:26
  • cereal killa: ghyt74 e boa semana de chuva e frio  RGG45wj erfb57j
    15 de Dezembro de 2025, 11:26
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    14 de Dezembro de 2025, 09:28
  • j.s.: tenham um excelente fim de semana com muitas comprinhas  :13arvoresnatalmagiagifs: sdfgsdg
    13 de Dezembro de 2025, 14:58
  • j.s.: dgtgtr a todos  :smiles_natal:
    13 de Dezembro de 2025, 14:57
  • FELISCUNHA: dgtgtr   49E09B4F  e bom fim de semana   :34rbzg9:
    13 de Dezembro de 2025, 12:29
  • JPratas: try65hytr Pessoal  4tj97u<z 2dgh8i classic bve567o+
    12 de Dezembro de 2025, 05:34
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    07 de Dezembro de 2025, 11:23
  • j.s.: tenham um excelente domingo :smiles_natal:
    06 de Dezembro de 2025, 23:36
  • j.s.: try65hytr a todos :13arvoresnatalmagiagifs:
    06 de Dezembro de 2025, 23:36
  • FELISCUNHA: ghyt74 pessoal  :34rbzg9:
    05 de Dezembro de 2025, 11:58
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    05 de Dezembro de 2025, 04:18
  • cereal killa: try65hytr pessoaal  :13arvoresnatalmagiagifs:  RGG45wj
    04 de Dezembro de 2025, 18:51
  • Bobo2009: Os nova
    01 de Dezembro de 2025, 21:02
  • FELISCUNHA: Votos de um santo domingo para todo o auditório   4tj97u<z
    30 de Novembro de 2025, 12:06
  • j.s.: tenham um excelente fim de semana  :smiles_natal:
    29 de Novembro de 2025, 14:19
  • j.s.: dgtgtr a todos  :13arvoresnatalmagiagifs:
    29 de Novembro de 2025, 14:18
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    29 de Novembro de 2025, 11:37
  • cereal killa: try65hytr pessoal ja cheira a prendas  erfb57j p0i8l
    28 de Novembro de 2025, 22:04
  • JPratas: try65hytr Pessoal  2dgh8i k7y8j0 classic
    28 de Novembro de 2025, 05:14

Autor Tópico: Format String Vulnerabilities  (Lida 154 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 128875
  • Karma: +0/-0
Format String Vulnerabilities
« em: 03 de Junho de 2021, 10:12 »

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 19 lectures (1h 16m) | Size: 420 MB
Learn Format String Vulnerabilities the right way to crack CTFs and the toughest certification exams out there

What you'll learn:
Students will learn practical format string vulnerability concepts for x64 processors
Students will learn how to leak memory addresses using format string vulnerabilities on Linux for x64 processors
Students will learn how to bypass stack canaries on Linux for x64 processors
Students will learn advanced Linux Binary Exploitation concepts
Students will learn how to use pwntools binary exploitation framework

Requirements
A computer with administrative access, if you want to follow the hands-on exercises.
It is good to have knowledge basic on exploit development

Description
This course teaches exploit development concepts for Linux (x86_64) and it is specifically focused on format string vulnerabilities. This course begins by introducing students to the format string concepts on Linux x86_64 platform (though the concepts remain the same on other architectures too). We will slowly gear towards understanding how format string vulnerabilities can be leveraged to exploit other vulnerabilities such as Buffer Overflows. This is clearly taught in the course by showing various practical examples such as bypassing stack canaries and bypassing ASLR. This is an entry level to intermediate level course and we encourage you to take this course if you are interested to learn exploit development concepts surrounding format string vulnerabilities and memory leaks specifically for 64 bit intel processors. However, remember that the course involves a lot of assembly language and debugging using a debugger. So, you need patience and passion to learn the concepts taught in the course. This course makes use of a variety of techniques on exploit development and brace yourself if you are willing to learn by sitting in front of a computer. After successfully completing this course, you will be ready to attempt several industry leading practical cyber security certification exams.

Who this course is for
Bug bounty hunters
CTF Players
Penetration testers
Security Auditors
Red Team Operators
Anyone interested in security.


Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction