
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn More<br>The Linux Exploit Development course is the most comprehensive and practical online course on exploit development, since it provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses. You will start from Linux stack smashing after the essential ELF fundamentals (GOT, PLT, SUID and SGID) are presented. You will then move to Linux exploit countermeasures and bypasses. At this point you will learn how to bypass mechanisms such as NoExecute, ASLR, Stack Cookie, RELRO and others through various techniques. Linux Return Oriented Programming and Linux shellcoding are covered next accompanied by assembly (incl. x64) basics, practical examples and labs. Finally, you will learn and practice advanced Linux exploitation by studying format string vulnerabilities and writing exploits for x64 Linux targets.</br> <br>This course is part of the Exploit Development Student Learning path which prepares you for the eCXD exam and certification</br>
Instructor for this course
Lukasz Mikula
Introduction to Linux Exploitation - Study Guide
Linux Stack Smashing - Study Guide
Abusing the EIP Control - Study Guide
Hidden Function
Linux Basic Stack Overflow
Linux Exploit Protections - Study Guide
NoExecute - Study Guide
Linux NX Bypass (ret2libc)
ASLR - Study Guide
Stack Cookie - Study Guide
RELRO - Study Guide
Other Protections - Study Guide
ROP Theory - Study Guide
ROP Theoretical Example - Study Guide
ROP Exploitation Example - Study Guide
x86 Assembly Basics - Study Guide
Basic Linux Shellcode - Study Guide
Reverse TCP Shellcode - Study Guide
x64 Architecture - Study Guide
Writing x64 Shellcode - Study Guide
Linux Shellcoding
Format String Vulnerabilities - Study Guide
Format String Exploitation - Study Guide
Linux x64 Basic Stack Overflow
Strict Firewall Bypass (Format String Exploitation + Socket Reuse Shellcode)
Linux x64 NX Bypass (ret2libc + ROP)
Linux NX & ASLR Bypass (Format String Exploitation + ROP)
Overcome ret2libc Limitations
Linux x64 Stack Canary, NX, & ASLR Bypass
Linux x64 ASLR Bypass
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?