Linux Exploits & Mitigation: Program Essentials

placeholder

Navigating the space between userland and kernel and how it impacts how programs reside and execute inside of an operating system can lead to a better understanding of how exploited. Being able to debug disassemble and dump programs are essential to finding vulnerabilities. In this course youll investigate the structure of the Linux kernel system calls and program interfaces by running debugging and disassembling code. Youll explore how programs fit in memory and how they are protected and executed. Youll debug and disassemble code into its assembly for inspection. Next youll explore the GNU C implementation of the standard library and interface using syscalls and the Linux system call table. Finally youll explore how programs and scripts are executed and how they are segmented in memory.