Linux Exploits & Mitigation: Program Essentials
“Navigating the space between userland and kernel and how it impacts how programs reside and execute inside of an operating system can lead to a better understanding of how it s exploited. Being able to debug disassemble and dump programs are essential to finding vulnerabilities. In this course you ll investigate the structure of the Linux kernel system calls and program interfaces by running debugging and disassembling code.
You ll explore how programs fit in memory and how they are protected and executed. You ll debug and disassemble code into its assembly for inspection. Next you ll explore the GNU C implementation of the standard library and interface using syscalls and the Linux system call table. Finally you ll explore how programs and scripts are executed and how they are segmented in memory.”