x86_64 Assembly Language and Shellcoding on Linux
What about this course?
This course focuses on teaching the basics of 64-bit assembly language for the x86_64 family of processors on the Linux platform and applying it to Infosec. Once we are through with the basics, we will look at writing shellcode, encoders, decoders, crypters, and other advanced low-level applications.

Instructor for this course
Vivek Ramachandran
Cyber Security
This course is composed by the following modules
Course Introduction
Course Lab Setup
Module 1: What is Assembly Language?
Module 1: CPU Information
Module 1: GDB Test Solution
Module 1: CPU Registers
Module 1: Hello World in 64-bit Assembly
Module 1: Hello World runtime analysis with GDB
Module 1: Reducing Instruction Size and Removing Nulls
Module 1: Data Types
Module 1: Endianess
Module 1: GDB TUI Mode
Module 1: Moving Data
Module 1: The Stack
Module 1: Arithmetic Operations
Module 1: Logical Operations
Module 1: Bit-Shifting Operations
Module 1: Control Operations
Module 1: Looping
Module 1: Load, Store and Move Strings
Module 1: Scan and Compare Strings
Module 1: Procedures
Module 2: Shellcoding Basics
Module 1: Stack Frames and Procedures
Module 2: Exit Shellcode
Module 2: HelloWorld Shellcode JMP-CALL-POP Technique
Module 2: HelloWorld Shellcode JMP-CALL-POP GDB Analysis
Module 2: HelloWorld Shellcode Stack Technique GDB Analysis
Module 2: HelloWorld Shellcode Stack Technique
Module 2: RIP Relative Addressing
Module 2: RIP Relative Addressing HelloWorld Shellcode
Module 2: Execve Shellcode Stack Method
Module 2: Execve Shellcode Stack Method GDB Analysis
Module 2: Execve JMP-CALL-POP Shellcode
Module 2: Execve JMP-CALL-POP Shellcode GDB Analysis
Module 2: XOR Encoder
Module 2: XOR Encoder GDB Analysis
Module 2: NOT Encoder
Module 2: NOT Encoder GDB Analysis
Module 2: Insertion Encoder
Module 2: Insertion Encoder GDB Analysis
Module 2: Metasploit Payloads
Module 2: Custom Payload with Metasploit Encoders
Module 2: MMX XOR Decoder
Module 2: Polymorphism
Module 2: Crypter
Module 2: Chaining Encoders and Crypters
Module 2: TCP Bind Shell I
Module 2: TCP Bind Shell II
Module 2: TCP Reverse Shell
Module 2: Exam Format
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?