Linux Exploits & Mitigation: Program Essentials
Ubuntu 20.04
| Intermediate
- 15 videos | 1h 20m 10s
- Includes Assessment
- Earns a Badge
Navigating the space between userland and kernel and how it impacts how programs reside and execute inside of an operating system can lead to a better understanding of how it's exploited. Being able to debug, disassemble, and dump programs are essential to finding vulnerabilities. In this course, you'll investigate the structure of the Linux kernel, system calls, and program interfaces by running, debugging, and disassembling code. You'll explore how programs fit in memory and how they are protected and executed. You'll debug and disassemble code into its assembly for inspection. Next, you'll explore the GNU C implementation of the standard library and interface using syscalls and the Linux system call table. Finally, you'll explore how programs and scripts are executed and how they are segmented in memory.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe a program's structure in memory in terms of address space layoutRun gdb to step through and trace debug a c programRun gdb to disassemble a program into its assembly codeRun objdump and readelf to disassemble and inspect a linux programDescribe how data and functionality are protected by separating computing resourcesDiscuss how data and functionality are protected within the linux operating system by kernel and userland separationDescribe the gnu c library (glibc) and how it integrates with the linux kernel
-
Interface with the linux kernel through system calls in cInterface with the linux kernel through system calls in assemblyDescribe the main components of the linux system call tableQuery system calls available in your installed version of linuxAnalyze simple linux program system calls using straceExplore how programs are segmented between their text, data, and bss segmentsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 24s
-
7m 19sUpon completion of this video, you will be able to describe a program's structure in memory in terms of address space layout. FREE ACCESS
-
7m 42sIn this video, learn how to use gdb to step through and debug a C program. FREE ACCESS
-
6m 14sTo disassemble a program into its assembly code, run gdb. FREE ACCESS
-
8m 49sIn this video, you will learn how to use objdump and readelf to disassemble and inspect a Linux program. FREE ACCESS
-
4m 30sUpon completion of this video, you will be able to describe how data and functionality are protected by separating computing resources. FREE ACCESS
-
4m 18sIn this video, you will discuss how data and functionality are protected within the Linux operating system by separation of the kernel and userland. FREE ACCESS
-
4m 3sUpon completion of this video, you will be able to describe the GNU C Library (glibc) and how it integrates with the Linux kernel. FREE ACCESS
-
6m 45sFind out how to interface with the Linux kernel through system calls in C. FREE ACCESS
-
6m 34sIn this video, you will learn how to interface with the Linux kernel using system calls in Assembly. FREE ACCESS
-
3m 49sUpon completion of this video, you will be able to describe the main components of the Linux system call table. FREE ACCESS
-
4m 33sIn this video, you will learn how to query system calls available in your installed version of Linux. FREE ACCESS
-
8m 51sIn this video, learn how to analyze simple Linux program system calls using strace. FREE ACCESS
-
4m 24sIn this video, you will explore how programs are segmented between their text, data, and BSS segments. FREE ACCESS
-
55s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.