I wrote this book because I couldn’t find anything else that was in bite-size chunks that methodically walked me through how to analyze compiled binaries, recognize bugs in software, fuzz, do dynamic analysis and write the exploit for various types of vulnerabilities in Linux applications. Don’t get me wrong, lots of websites and blogs exist, and some companies will sell you several days of training for thousands of dollars, and others companies will sell you a pdf, some videos and access to a virtual range to get you started and then you’re left to fend for yourself. I didn’t like these options, and most were too expensive. I kept searching and searching for something that was affordable yet still provided the same level of quality and information as the alternatives. Nothing really existed so, I said fuck it, I’ll write my own.
You will learn how to:
- write a simple C program - Compile it with gcc - Look at compiled binaries with file and readelf - Debug binary with gdb and gef - Conduct simple dynamic analysis of compiled C program - Recognize the stack and various registers - Set breakpoints and examine memory and its contents