Friday, November 30, 2018

SLAE32 Intro

This blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification:
http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/
SLAE-1327
https://github.com/Nelis1982/SLAE.git

So, after OSCP and OSWP I figured, going for the OSCE certification would be a nice challenge.

Analyzing some reviews I quickly discovered the need for some additional assembly and debugging knowledge.

Since several security enthusiasts recommended the SecurityTube Linux Assembly Expert (SLAE), I figured that it would be a nice start......

Paid some dollars to retrieve the PDF slides (and code base) and I went through all the exercises. Needless to say that the instructor (Vivek Ramachandran) does an excellent job in teaching this course in very precise manner. Even I with no assembly knowledge at all, found myself going through this course at a comfortable pace.

Note that the exam format is a little different here. 7 assignments, varying in difficulty, need solving in a unique manner. One of the criteria is that blog post needs to be created for completing the requirements for the certification. In this blog a detailed and insightful explanation of the exercises is required.

Next requirement is that the code created during these exercises needs to be uploaded to github. My github and specific the SLAE can be found on:
https://github.com/Nelis1982/SLAE

In order to keep this blog a little structured, I will make separate blogs for each assignment.

Following commands were used often:
Dumping opcodes from binary
https://www.commandlinefu.com/commands/view/6051/get-all-shellcode-on-binary-file-from-objdump
Reversing, hexing with python:
Script for assembling, linking, dumping opcodes, embedding in shellcode running app (in C) file and compiling:





No comments:

Post a Comment