Overview ***Buying this ebook on an iPad or iPhone? Use Safari not the Amazon app to purchase*** I wrote this book because I couldn’t find anything else that was in bite-size chunks that methodically walked me through how to analyze compiled binaries, recognize bugs in software, fuzz, do dynamic analysis and write the exploit for various types of vulnerabilities in Linux applications. Don’t get me wrong, lots of websites and blogs exist, and some companies will sell you several days of training for thousands of dollars, and others companies will sell you a pdf, some videos and access to a virtual range to get you started and then you’re left to fend for yourself. I didn’t like these options, and most were too expensive. I kept searching and searching for something that was affordable yet still provided the same level of quality and information as the alternatives. This series of books is my attempt to provide affordable, and self-contained lessons on specific exploit topics. You will learn how - analyze simple C programs - identify buffer overflow vulnerabilities in source code - compile and test your binary - analyze programs with gdb and gef - fuzz a program with a buffer overflow vulnerability in it - create patterns of data to crash a program and find offsets - generate POC malicious input to prove buffer overflow vulnerability