Linux Exploits & Mitigation: Program Essentials

Ubuntu 20.04    |    Intermediate
  • 15 videos | 1h 20m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 17 users Rating 4.6 of 17 users (17)
Navigating the space between userland and kernel and how it impacts how programs reside and execute inside of an operating system can lead to a better understanding of how it's exploited. Being able to debug, disassemble, and dump programs are essential to finding vulnerabilities. In this course, you'll investigate the structure of the Linux kernel, system calls, and program interfaces by running, debugging, and disassembling code. You'll explore how programs fit in memory and how they are protected and executed. You'll debug and disassemble code into its assembly for inspection. Next, you'll explore the GNU C implementation of the standard library and interface using syscalls and the Linux system call table. Finally, you'll explore how programs and scripts are executed and how they are segmented in memory.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe a program's structure in memory in terms of address space layout
    Run gdb to step through and trace debug a c program
    Run gdb to disassemble a program into its assembly code
    Run objdump and readelf to disassemble and inspect a linux program
    Describe how data and functionality are protected by separating computing resources
    Discuss how data and functionality are protected within the linux operating system by kernel and userland separation
    Describe the gnu c library (glibc) and how it integrates with the linux kernel
  • Interface with the linux kernel through system calls in c
    Interface with the linux kernel through system calls in assembly
    Describe the main components of the linux system call table
    Query system calls available in your installed version of linux
    Analyze simple linux program system calls using strace
    Explore how programs are segmented between their text, data, and bss segments
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 24s
  • 7m 19s
    Upon completion of this video, you will be able to describe a program's structure in memory in terms of address space layout. FREE ACCESS
  • Locked
    3.  Running GDB
    7m 42s
    In this video, learn how to use gdb to step through and debug a C program. FREE ACCESS
  • Locked
    4.  Disassembling a Program
    6m 14s
    To disassemble a program into its assembly code, run gdb. FREE ACCESS
  • Locked
    5.  Dumping Objects
    8m 49s
    In this video, you will learn how to use objdump and readelf to disassemble and inspect a Linux program. FREE ACCESS
  • Locked
    6.  Protection Rings
    4m 30s
    Upon completion of this video, you will be able to describe how data and functionality are protected by separating computing resources. FREE ACCESS
  • Locked
    7.  Kernel and Userland Separation
    4m 18s
    In this video, you will discuss how data and functionality are protected within the Linux operating system by separation of the kernel and userland. FREE ACCESS
  • Locked
    8.  The GNU C Library
    4m 3s
    Upon completion of this video, you will be able to describe the GNU C Library (glibc) and how it integrates with the Linux kernel. FREE ACCESS
  • Locked
    9.  Using Syscalls with C
    6m 45s
    Find out how to interface with the Linux kernel through system calls in C. FREE ACCESS
  • Locked
    10.  Using Syscalls with Assembly
    6m 34s
    In this video, you will learn how to interface with the Linux kernel using system calls in Assembly. FREE ACCESS
  • Locked
    11.  Linux System Call Table
    3m 49s
    Upon completion of this video, you will be able to describe the main components of the Linux system call table. FREE ACCESS
  • Locked
    12.  Querying Implemented System Calls
    4m 33s
    In this video, you will learn how to query system calls available in your installed version of Linux. FREE ACCESS
  • Locked
    13.  Executing Programs
    8m 51s
    In this video, learn how to analyze simple Linux program system calls using strace. FREE ACCESS
  • Locked
    14.  Segmenting Programs
    4m 24s
    In this video, you will explore how programs are segmented between their text, data, and BSS segments. FREE ACCESS
  • Locked
    15.  Course Summary
    55s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 179 users Rating 4.6 of 179 users (179)
Rating 4.3 of 15 users Rating 4.3 of 15 users (15)
Rating 4.8 of 10 users Rating 4.8 of 10 users (10)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 13 users Rating 4.7 of 13 users (13)
Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
Rating 4.5 of 39 users Rating 4.5 of 39 users (39)