8. Exploiting printf function GOT entry to get system shell
7. Overwriting exit function memory address in GOT entry with shellcode
6. Using short writes method to write bytes to any arbitrary memory address
5. Method of writing data to any arbitrary memory address
4. Understanding Direct parameter access and field width for developing exploit
3. Reading Data from any arbitrary memory address
2. What is Format String Vulnerability
1. What are Format specifiers
3. ROP chaining the libc functions to get the specific user shell by pop3ret
2. Developing ROP exploit by using multiple ropgadgets to get the shell
1. What is Return Oriented Programming and how ROP exploits works
10. Bypassing RELRO protection of Binary
9. What is RELRO exploit
8. Bypassing stack cookie protection of the Binary
7. Understanding the stack Cookie protection behaviour of binary inside gdb
6. Tracking down the canary value inside the protected binary
5. Understanding Stack Cookie protection mechanism
4. Bypassing ASLR protection of the Binary
3. Bypassing DEP protection of Binary
2. Concept of bypassing DEP protection of the binary
1. What is DEP protection inside the binary
18. Finding the shell address in more reliable way
17. Exploiting the binary without using nops
16. How to reduce address searching steps inside stack
15. Exploiting a program with very less buffer area
14. Developing Stack Buffer overflow exploit by using environment variable
13. Why do we use environment variable
12. Environment variables and the stack
11. Developing first exploit to get a system shell
10. Basic important roadmap of exploit development process
9. Exploiting our first binary program in stack memory area
8. Tracking down return address of any function inside stack memory
7. Tracking down the function input arguments inside stack boundary
6. How to track down all the local variables inside running memory of binary
5. What is ASLR and why it is used inside Operating System
4. How to configure lab machine
3. Lab Configurations
2. What exactly is a Buffer Overflow Attack
1. Mystery of return address in main function
18. Dangers of SUID files
17. Practical identification of plt and got sections inside gdb
16. Purpose of plt and got sections in binary
15. What are the symbols inside the binary
14. What does a loader acutally do
13. Practical concepts of a linker
12. Basic ELF static analysis
11. Full analysis of stacks in multi level functions of binary
10. Full examination of stack area in binary
9. Concept of stack inside the binary
8. Memory segmentation of binary and stack
7. what is the purpose of stack in memory
6. Dynamic Memory layout inside the process
5. Static memory layout of Binary file
4. Binary compilation process
3. GDB basics for exploit development
2. Installing gdb plugins for exploit development lab
1. Before any Exploitations
2. What is Format String Vulnerability
1. What are Format specifiers
3. ROP chaining the libc functions to get the specific user shell by pop3ret
2. Developing ROP exploit by using multiple ropgadgets to get the shell
1. What is Return Oriented Programming and how ROP exploits works
3. Lab machine configurations
2. What skills are needed for this course

Notes