I don’t know when learning programming became a headache. There are always those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and become the dream of countless girls.
But reality always hits hard….
There are many moments when I feel the urge to smash my keyboard, but we heroes will never waste our efforts like that; can smashing the keyboard really help us learn? No, we can learn at Kanxue.
If you want to learn more about assembly language and binary vulnerabilities, then don’t miss out on Kanxue’s high-quality courses—
“Detailed Explanation of Assembly Language and Introduction to Binary Vulnerabilities“
This course, with nearly 3000 students, let’s take a closer look together~!
Instructor Introduction
Personal Skills: C/C++, Python, Assembly
Special Skills: Software Debugging, Reverse Analysis
Additional Skills: Teaching
Course Introduction
This course mainly explains assembly language and Windows system knowledge under the Windows operating system. It uses x86 assembly as the main content, with x64 and 16-bit assembly as supplementary content. It provides an in-depth understanding of the transition from real mode to protected mode. Learn about the structure of executable files in Windows. Finally, it explains the techniques for writing shellcode in Windows using assembly, laying the groundwork for future security studies.
Course Details
Special Edition: Vulnerability Debugging
01.Stack Overflow Experiment–Adjacent Variable Overwrite
02. Stack Overflow Experiment – Using Overwrite to Control Program Execution Flow 03. Stack Overflow Experiment – Initial Exploration of Shellcode 04. Stack Overflow Experiment – Introducing Jump Techniques 05. Shellcode Development Techniques in VS Environment Environment Setup 06. Shellcode Development Techniques in VS Environment Preventing Absolute Address Dependency Chapter One – Number Systems 1.1 Concept of Number Systems 1.2 Original Code, Inverted Code, Complement Code 1.3 Logical Operations Chapter Two – Assembly Language 2.1 Overview of Assembly Language Stages 2.2 General Registers 2.3 Von Neumann Architecture 2.4 Memory Basics 2.5 EFLAGS Register 2.6 Writing Assembly Language with VS 2.7 Mathematical Operations in Assembly Language 2.8 Logical Operations in Assembly Language 2.9 Introduction to Loops 2.10 Stack Operations 2.11 Data Movement Instructions 2.12 Comparison Instructions 2.13 JCC Conditional Transfer Instructions 2.14 String Operation Instructions 2.15 CALL and RETN 2.16 Functions in Assembly
Updated to 6.2….
– End –
Selected Courses
* Step-by-step guide to building your own shellcode development framework! * Learning Web Security from Scratch, which course is right for you?* The most hardcore course, dare to challenge it?* Play with different programming languages
* How to identify a sugar-coated bullet?Advanced countermeasure techniques teach you to defeat malicious programs
* Beginner’s guide to binary security, starting from vulnerability discovery
* Assembly language that every programmer must know
Official Account ID: ikanxue
Official Weibo: Kanxue Security
Business Cooperation: [email protected]
Click Read Original to learn for free~